<?xml version="1.0" encoding="utf-8"?>
<cvemap updated="2026-04-15T13:20:34" license="CC BY 4.0, https://creativecommons.org/licenses/by/4.0/">

<Vulnerability name="CVE-1999-0002">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
    </Details>
    <Statement xml:lang="en:us">
This issue has been addressed in nfs-server packages as shipped in Red Hat Linux since version nfs-server-2.2beta37.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0002
https://nvd.nist.gov/vuln/detail/CVE-1999-0002
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0018">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in statd allows root privileges.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw is specific to statd on Solaris, IRIX, Unixware and AIX platforms.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0018
https://nvd.nist.gov/vuln/detail/CVE-1999-0018
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0019">
    <Details source="Mitre" xml:lang="en:us">
Delete or create a file via rpc.statd, due to invalid information.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This flaw is specific to statd on Solaris platform.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0019
https://nvd.nist.gov/vuln/detail/CVE-1999-0019
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0077">
    <Details source="Mitre" xml:lang="en:us">
Predictable TCP sequence numbers allow spoofing.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of the Linux kernel as
shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG. The Linux kernel has implemented secure random number generated initial TCP sequences to prevent TCP hijacking attacks since 1996.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0077
https://nvd.nist.gov/vuln/detail/CVE-1999-0077
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0199">
    <PublicDate>1999-11-09T00:00:00</PublicDate>
    <Bugzilla id="1885775" url="https://bugzilla.redhat.com/show_bug.cgi?id=1885775" xml:lang="en:us">
glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>0.0</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-1053</CWE>
    <Details source="Mitre" xml:lang="en:us">
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.

This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0199
https://nvd.nist.gov/vuln/detail/CVE-1999-0199
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0210">
    <Details source="Mitre" xml:lang="en:us">
Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This flaw is specific to automountd on Solaris platform.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0210
https://nvd.nist.gov/vuln/detail/CVE-1999-0210
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0428">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>1999-03-22T00:00:00</PublicDate>
    <Bugzilla id="1891836" url="https://bugzilla.redhat.com/show_bug.cgi?id=1891836" xml:lang="en:us">
openssl: allow remote attackers to reuse SSL sessions and bypass access controls
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-384</CWE>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
    </Details>
    <Statement xml:lang="en:us">
OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions &lt; 0.92b, which are not shipped in Red Hat products.
    </Statement>
    <PackageState cpe="cpe:/a:redhat:acm:2">
        <ProductName>Red Hat Advanced Cluster Management for Kubernetes 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl097a</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ovmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-openssl10</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mingw-openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>jbcs-httpd24-openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_application_platform:5">
        <ProductName>Red Hat JBoss Enterprise Application Platform 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_application_platform:6">
        <ProductName>Red Hat JBoss Enterprise Application Platform 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>jbcs-httpd24-openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0428
https://nvd.nist.gov/vuln/detail/CVE-1999-0428
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0493">
    <Details source="Mitre" xml:lang="en:us">
rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This flaw is specific to statd on Solaris platform.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0493
https://nvd.nist.gov/vuln/detail/CVE-1999-0493
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0523">
    <Details source="Mitre" xml:lang="en:us">
ICMP echo (ping) is allowed from arbitrary hosts.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it's likely that in a production environment those would be filtered by some firewall on entry to your network.  However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them.

For more details, please see:
http://kbase.redhat.com/faq/FAQ_43_4304.shtm
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0523
https://nvd.nist.gov/vuln/detail/CVE-1999-0523
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0524">
    <Details source="Mitre" xml:lang="en:us">
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux is configured by default to respond to all ICMP requests. Users may configure the firewall to prevent a system from responding to certain ICMP requests.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0524
https://nvd.nist.gov/vuln/detail/CVE-1999-0524
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0710">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>1999-07-25T00:00:00</PublicDate>
    <Bugzilla id="1616452" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616452" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0710
https://nvd.nist.gov/vuln/detail/CVE-1999-0710
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0719">
    <PublicDate>1999-07-23T00:00:00</PublicDate>
    <Bugzilla id="1616453" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616453" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0719
https://nvd.nist.gov/vuln/detail/CVE-1999-0719
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0804">
    <PublicDate>1999-06-03T00:00:00</PublicDate>
    <Bugzilla id="1616454" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616454" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0804
https://nvd.nist.gov/vuln/detail/CVE-1999-0804
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0831">
    <PublicDate>1999-11-18T00:00:00</PublicDate>
    <Bugzilla id="1616455" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616455" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Denial of service in Linux syslogd via a large number of connections.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0831
https://nvd.nist.gov/vuln/detail/CVE-1999-0831
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0832">
    <PublicDate>1999-11-30T00:00:00</PublicDate>
    <Bugzilla id="1616456" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616456" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0832
https://nvd.nist.gov/vuln/detail/CVE-1999-0832
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0894">
    <PublicDate>1999-10-20T00:00:00</PublicDate>
    <Bugzilla id="1616457" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616457" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0894
https://nvd.nist.gov/vuln/detail/CVE-1999-0894
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-0997">
    <Details source="Mitre" xml:lang="en:us">
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider CVE-1999-0997 to be a security vulnerability.  The wu-ftpd process chroots itself into the target ftp directory and will only run external commands as the user logged into the ftp server.  Because the process chroots itself, an attacker needs a valid login with write access to the ftp server, and even then they could only potentially execute commands as themselves.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-0997
https://nvd.nist.gov/vuln/detail/CVE-1999-0997
    </References>
</Vulnerability>

<Vulnerability name="CVE-1999-1572">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>1996-07-16T00:00:00</PublicDate>
    <Bugzilla id="1616458" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616458" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Mike O'Connor for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:080">RHSA-2005:080</Advisory>
        <Package name="cpio">cpio-0:2.5-3e.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:073">RHSA-2005:073</Advisory>
        <Package name="cpio">cpio-0:2.5-7.EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-1999-1572
https://nvd.nist.gov/vuln/detail/CVE-1999-1572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0031">
    <PublicDate>1999-11-08T00:00:00</PublicDate>
    <Bugzilla id="1616459" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616459" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0031
https://nvd.nist.gov/vuln/detail/CVE-2000-0031
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0035">
    <PublicDate>1999-12-28T00:00:00</PublicDate>
    <Bugzilla id="1616460" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616460" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
resend command in Majordomo allows local users to gain privileges via shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Powertools 6.1 - RHSA-2000:005 (2000-01-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0035
https://nvd.nist.gov/vuln/detail/CVE-2000-0035
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0037">
    <PublicDate>1999-12-28T00:00:00</PublicDate>
    <Bugzilla id="1616461" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616461" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Majordomo wrapper allows local users to gain privileges by specifying an alternate configuration file.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Powertools 6.1 - RHSA-2000:005 (2000-01-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0037
https://nvd.nist.gov/vuln/detail/CVE-2000-0037
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0052">
    <PublicDate>2000-01-04T00:00:00</PublicDate>
    <Bugzilla id="1616462" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616462" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:001 (2000-01-04)
- Red Hat Linux 6.1 - RHSA-2000:001 (2000-01-04)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0052
https://nvd.nist.gov/vuln/detail/CVE-2000-0052
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0183">
    <PublicDate>2000-03-10T00:00:00</PublicDate>
    <Bugzilla id="1616463" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616463" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ircII 4.4 IRC client allows remote attackers to execute commands via the DCC chat capability.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 4.2 - RHSA-2000:008 (2000-03-30)
- Red Hat Linux 5.2 - RHSA-2000:008 (2000-03-30)
- Red Hat Linux 6.0 - RHSA-2000:008 (2000-03-30)
- Red Hat Linux 6.1 - RHSA-2000:008 (2000-03-30)
- Red Hat Linux 6.2 - RHSA-2000:008 (2000-03-30)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0183
https://nvd.nist.gov/vuln/detail/CVE-2000-0183
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0186">
    <PublicDate>2000-02-28T00:00:00</PublicDate>
    <Bugzilla id="1616464" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616464" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:100 (2000-11-02)
- Red Hat Linux 6.2 - RHSA-2000:100 (2000-11-02)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0186
https://nvd.nist.gov/vuln/detail/CVE-2000-0186
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0196">
    <PublicDate>2000-02-28T00:00:00</PublicDate>
    <Bugzilla id="1616465" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616465" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:006 (2000-03-06)
- Red Hat Linux 6.0 - RHSA-2000:006 (2000-03-06)
- Red Hat Linux 6.1 - RHSA-2000:006 (2000-03-06)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0196
https://nvd.nist.gov/vuln/detail/CVE-2000-0196
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0229">
    <PublicDate>2000-03-22T00:00:00</PublicDate>
    <Bugzilla id="1616466" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616466" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:009 (2000-04-12)
- Red Hat Linux 5.2 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.0 - RHSA-2000:009 (2000-04-12)
- Red Hat Linux 6.0 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.1 - RHSA-2000:009 (2000-04-12)
- Red Hat Linux 6.1 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.2 - RHSA-2000:009 (2000-04-12)
- Red Hat Linux 6.2 - RHSA-2000:045 (2000-07-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0229
https://nvd.nist.gov/vuln/detail/CVE-2000-0229
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0230">
    <PublicDate>2000-03-13T00:00:00</PublicDate>
    <Bugzilla id="1616467" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616467" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.1 - RHSA-2000:016 (2000-04-21)
- Red Hat Powertools 6.2 - RHSA-2000:016 (2000-04-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0230
https://nvd.nist.gov/vuln/detail/CVE-2000-0230
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0248">
    <PublicDate>2000-04-24T00:00:00</PublicDate>
    <Bugzilla id="1616468" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616468" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0248
https://nvd.nist.gov/vuln/detail/CVE-2000-0248
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0269">
    <PublicDate>2000-04-18T00:00:00</PublicDate>
    <Bugzilla id="1616469" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616469" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:036 (2000-06-15)
- Red Hat Linux 6.1 - RHSA-2000:036 (2000-06-15)
- Red Hat Linux 6.2 - RHSA-2000:036 (2000-06-15)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0269
https://nvd.nist.gov/vuln/detail/CVE-2000-0269
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0322">
    <PublicDate>2000-04-24T00:00:00</PublicDate>
    <Bugzilla id="1616470" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616470" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:014 (2000-04-24)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0322
https://nvd.nist.gov/vuln/detail/CVE-2000-0322
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0336">
    <PublicDate>2000-04-13T00:00:00</PublicDate>
    <Bugzilla id="1616471" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616471" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.1 - RHSA-2000:012 (2000-04-21)
- Red Hat Linux 6.2 - RHSA-2000:012 (2000-04-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0336
https://nvd.nist.gov/vuln/detail/CVE-2000-0336
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0356">
    <PublicDate>1999-10-13T00:00:00</PublicDate>
    <Bugzilla id="1616472" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616472" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0356
https://nvd.nist.gov/vuln/detail/CVE-2000-0356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0357">
    <PublicDate>1999-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616473" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616473" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0357
https://nvd.nist.gov/vuln/detail/CVE-2000-0357
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0358">
    <PublicDate>1999-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616474" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616474" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0358
https://nvd.nist.gov/vuln/detail/CVE-2000-0358
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0364">
    <PublicDate>1999-06-06T00:00:00</PublicDate>
    <Bugzilla id="1616475" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616475" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
screen and rxvt in Red Hat Linux 6.0 do not properly set the modes of tty devices, which allows local users to write to other ttys.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0364
https://nvd.nist.gov/vuln/detail/CVE-2000-0364
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0365">
    <PublicDate>1999-06-06T00:00:00</PublicDate>
    <Bugzilla id="1616476" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616476" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Red Hat Linux 6.0 installs the /dev/pts file system with insecure modes, which allows local users to write to other tty devices.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0365
https://nvd.nist.gov/vuln/detail/CVE-2000-0365
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0373">
    <PublicDate>1999-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616477" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616477" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerabilities in the KDE kvt terminal program allow local users to gain root privileges.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0373
https://nvd.nist.gov/vuln/detail/CVE-2000-0373
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0389">
    <PublicDate>2000-05-16T00:00:00</PublicDate>
    <Bugzilla id="1616478" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616478" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:025 (2000-05-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0389
https://nvd.nist.gov/vuln/detail/CVE-2000-0389
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0390">
    <PublicDate>2000-05-16T00:00:00</PublicDate>
    <Bugzilla id="1616479" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616479" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:025 (2000-05-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0390
https://nvd.nist.gov/vuln/detail/CVE-2000-0390
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0391">
    <PublicDate>2000-05-16T00:00:00</PublicDate>
    <Bugzilla id="1616480" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616480" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:025 (2000-05-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0391
https://nvd.nist.gov/vuln/detail/CVE-2000-0391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0392">
    <PublicDate>2000-05-16T00:00:00</PublicDate>
    <Bugzilla id="1616481" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616481" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:025 (2000-05-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0392
https://nvd.nist.gov/vuln/detail/CVE-2000-0392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0406">
    <PublicDate>2000-05-12T00:00:00</PublicDate>
    <Bugzilla id="1616482" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616482" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the &quot;Acros-Suencksen SSL&quot; vulnerability.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:028 (2000-05-19)
- Red Hat Linux 5.1 - RHSA-2000:028 (2000-05-19)
- Red Hat Linux 5.2 - RHSA-2000:028 (2000-05-19)
- Red Hat Linux 6.0 - RHSA-2000:028 (2000-05-19)
- Red Hat Linux 6.1 - RHSA-2000:028 (2000-05-19)
- Red Hat Linux 6.2 - RHSA-2000:028 (2000-05-19)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0406
https://nvd.nist.gov/vuln/detail/CVE-2000-0406
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0483">
    <PublicDate>2000-06-15T00:00:00</PublicDate>
    <Bugzilla id="1616483" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616483" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The DocumentTemplate package in Zope 2.2 and earlier allows a remote attacker to modify DTMLDocuments or DTMLMethods without authorization.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.1 - RHSA-2000:038 (2000-06-22)
- Red Hat Powertools 6.2 - RHSA-2000:038 (2000-06-22)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0483
https://nvd.nist.gov/vuln/detail/CVE-2000-0483
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0491">
    <PublicDate>2000-05-21T00:00:00</PublicDate>
    <Bugzilla id="1616484" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616484" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote attackers to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:027 (2000-05-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0491
https://nvd.nist.gov/vuln/detail/CVE-2000-0491
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0506">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616485" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616485" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;capabilities&quot; feature in Linux before 2.2.16 allows local users to cause a denial of service or gain privileges by setting the capabilities to prevent a setuid program from dropping privileges, aka the &quot;Linux kernel setuid/setcap vulnerability.&quot;
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:037 (2000-06-20)
- Red Hat Linux 6.1 - RHSA-2000:037 (2000-06-20)
- Red Hat Linux 6.2 - RHSA-2000:037 (2000-06-20)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0506
https://nvd.nist.gov/vuln/detail/CVE-2000-0506
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0520">
    <PublicDate>2000-06-07T00:00:00</PublicDate>
    <Bugzilla id="1616486" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616486" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in restore program 0.4b17 and earlier in dump package allows local users to execute arbitrary commands via a long tape name.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:100 (2000-11-02)
- Red Hat Linux 6.2 - RHSA-2000:100 (2000-11-02)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0520
https://nvd.nist.gov/vuln/detail/CVE-2000-0520
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0530">
    <PublicDate>2000-05-31T00:00:00</PublicDate>
    <Bugzilla id="1616487" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616487" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The KApplication class in the KDE 1.1.2 configuration file management capability allows local users to overwrite arbitrary files.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:032 (2000-06-07)
- Red Hat Powertools 6.1 - RHSA-2000:032 (2000-06-07)
- Red Hat Powertools 6.2 - RHSA-2000:032 (2000-06-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0530
https://nvd.nist.gov/vuln/detail/CVE-2000-0530
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0531">
    <PublicDate>2000-06-20T00:00:00</PublicDate>
    <Bugzilla id="1616488" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616488" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.0 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.1 - RHSA-2000:045 (2000-07-26)
- Red Hat Linux 6.2 - RHSA-2000:045 (2000-07-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0531
https://nvd.nist.gov/vuln/detail/CVE-2000-0531
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0546">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616489" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616489" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the lastrealm variable in the set_tgtkey function.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:031 (2000-06-09)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0546
https://nvd.nist.gov/vuln/detail/CVE-2000-0546
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0547">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616490" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616490" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the localrealm variable in the process_v4 function.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:031 (2000-06-09)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0547
https://nvd.nist.gov/vuln/detail/CVE-2000-0547
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0548">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616491" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616491" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:031 (2000-06-09)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0548
https://nvd.nist.gov/vuln/detail/CVE-2000-0548
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0549">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616492" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616492" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kerberos 4 KDC program does not properly check for null termination of AUTH_MSG_KDC_REQUEST requests, which allows remote attackers to cause a denial of service via a malformed request.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:031 (2000-06-09)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0549
https://nvd.nist.gov/vuln/detail/CVE-2000-0549
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0550">
    <PublicDate>2000-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616493" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616493" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kerberos 4 KDC program improperly frees memory twice (aka &quot;double-free&quot;), which allows remote attackers to cause a denial of service.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:031 (2000-06-09)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0550
https://nvd.nist.gov/vuln/detail/CVE-2000-0550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0566">
    <PublicDate>2000-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616494" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616494" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
makewhatis in Linux man package allows local users to overwrite files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:041 (2000-07-04)
- Red Hat Linux 6.0 - RHSA-2000:041 (2000-07-04)
- Red Hat Linux 6.1 - RHSA-2000:041 (2000-07-04)
- Red Hat Linux 6.2 - RHSA-2000:041 (2000-07-04)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0566
https://nvd.nist.gov/vuln/detail/CVE-2000-0566
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0573">
    <PublicDate>2000-06-23T00:00:00</PublicDate>
    <Bugzilla id="1616495" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616495" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:039 (2000-06-23)
- Red Hat Linux 6.2 - RHSA-2000:039 (2000-06-23)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0573
https://nvd.nist.gov/vuln/detail/CVE-2000-0573
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0594">
    <PublicDate>2000-07-05T00:00:00</PublicDate>
    <Bugzilla id="1616496" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616496" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:042 (2000-07-06)
- Red Hat Powertools 6.1 - RHSA-2000:042 (2000-07-06)
- Red Hat Powertools 6.2 - RHSA-2000:042 (2000-07-06)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0594
https://nvd.nist.gov/vuln/detail/CVE-2000-0594
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0633">
    <PublicDate>2000-07-18T00:00:00</PublicDate>
    <Bugzilla id="1616497" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616497" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:053 (2000-10-13)
- Red Hat Linux 6.1 - RHSA-2000:053 (2000-10-13)
- Red Hat Linux 6.2 - RHSA-2000:053 (2000-10-13)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0633
https://nvd.nist.gov/vuln/detail/CVE-2000-0633
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0655">
    <PublicDate>2000-07-24T00:00:00</PublicDate>
    <Bugzilla id="1616498" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616498" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape Communicator 4.73 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a JPEG image containing a comment with an illegal field length of 1.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:046 (2000-07-31)
- Red Hat Linux 6.0 - RHSA-2000:046 (2000-07-31)
- Red Hat Linux 6.1 - RHSA-2000:046 (2000-07-31)
- Red Hat Linux 6.2 - RHSA-2000:046 (2000-07-31)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0655
https://nvd.nist.gov/vuln/detail/CVE-2000-0655
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0666">
    <PublicDate>2000-07-16T00:00:00</PublicDate>
    <Bugzilla id="1616499" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616499" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:043 (2000-07-17)
- Red Hat Linux 6.1 - RHSA-2000:043 (2000-07-17)
- Red Hat Linux 6.2 - RHSA-2000:043 (2000-07-17)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0666
https://nvd.nist.gov/vuln/detail/CVE-2000-0666
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0668">
    <PublicDate>2000-07-21T00:00:00</PublicDate>
    <Bugzilla id="1616500" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616500" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:044 (2000-07-21)
- Red Hat Linux 6.1 - RHSA-2000:044 (2000-07-21)
- Red Hat Linux 6.2 - RHSA-2000:044 (2000-07-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0668
https://nvd.nist.gov/vuln/detail/CVE-2000-0668
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0676">
    <PublicDate>2000-08-03T00:00:00</PublicDate>
    <Bugzilla id="1616501" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616501" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape Communicator and Navigator 4.04 through 4.74 allows remote attackers to read arbitrary files by using a Java applet to open a connection to a URL using the &quot;file&quot;, &quot;http&quot;, &quot;https&quot;, and &quot;ftp&quot; protocols, as demonstrated by Brown Orifice.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:054 (2000-08-18)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0676
https://nvd.nist.gov/vuln/detail/CVE-2000-0676
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0691">
    <PublicDate>2000-08-25T00:00:00</PublicDate>
    <Bugzilla id="1616502" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616502" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The faxrunq and faxrunqd in the mgetty package allows local users to create or modify arbitrary files via a symlink attack which creates a symlink in from /var/spool/fax/outgoing/.last_run to the target file.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:059 (2000-09-07)
- Red Hat Linux 6.0 - RHSA-2000:059 (2000-09-07)
- Red Hat Linux 6.1 - RHSA-2000:059 (2000-09-07)
- Red Hat Linux 6.2 - RHSA-2000:059 (2000-09-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0691
https://nvd.nist.gov/vuln/detail/CVE-2000-0691
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0701">
    <PublicDate>2000-08-01T00:00:00</PublicDate>
    <Bugzilla id="1616503" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616503" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Secure Web Server 3.2 - RHSA-2000:030 (2000-05-24)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0701
https://nvd.nist.gov/vuln/detail/CVE-2000-0701
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0703">
    <PublicDate>2000-08-07T00:00:00</PublicDate>
    <Bugzilla id="1616504" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616504" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
suidperl (aka sperl) does not properly cleanse the escape sequence &quot;~!&quot; before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the &quot;interactive&quot; environmental variable and calling suidperl with a filename that contains the escape sequence.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:048 (2000-08-07)
- Red Hat Linux 5.1 - RHSA-2000:048 (2000-08-07)
- Red Hat Linux 5.2 - RHSA-2000:048 (2000-08-07)
- Red Hat Linux 6.0 - RHSA-2000:048 (2000-08-07)
- Red Hat Linux 6.1 - RHSA-2000:048 (2000-08-07)
- Red Hat Linux 6.2 - RHSA-2000:048 (2000-08-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0703
https://nvd.nist.gov/vuln/detail/CVE-2000-0703
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0705">
    <PublicDate>2000-08-07T00:00:00</PublicDate>
    <Bugzilla id="1616505" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616505" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ntop running in web mode allows remote attackers to read arbitrary files via a .. (dot dot) attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Powertools 6.2 - RHSA-2000:049 (2000-08-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0705
https://nvd.nist.gov/vuln/detail/CVE-2000-0705
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0714">
    <PublicDate>2000-08-08T00:00:00</PublicDate>
    <Bugzilla id="1616506" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616506" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
umb-scheme 3.2-11 for Red Hat Linux is installed with world-writeable files.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:047 (2000-08-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0714
https://nvd.nist.gov/vuln/detail/CVE-2000-0714
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0715">
    <PublicDate>2000-08-05T00:00:00</PublicDate>
    <Bugzilla id="1616507" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616507" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2000-12-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:122">RHSA-2000:122</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2000-12-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:122">RHSA-2000:122</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0715
https://nvd.nist.gov/vuln/detail/CVE-2000-0715
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0725">
    <PublicDate>2000-08-10T00:00:00</PublicDate>
    <Bugzilla id="1616508" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616508" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.1 - RHSA-2000:052 (2000-08-11)
- Red Hat Powertools 6.2 - RHSA-2000:052 (2000-08-11)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0725
https://nvd.nist.gov/vuln/detail/CVE-2000-0725
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0727">
    <PublicDate>2000-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616509" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616509" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xpdf PDF viewer client earlier than 0.91 does not properly launch a web browser for embedded URL's, which allows an attacker to execute arbitrary commands via a URL that contains shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:060 (2000-09-13)
- Red Hat Linux 6.2 - RHSA-2000:060 (2000-09-13)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0727
https://nvd.nist.gov/vuln/detail/CVE-2000-0727
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0728">
    <PublicDate>2000-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616510" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616510" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xpdf PDF viewer client earlier than 0.91 allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:060 (2000-09-13)
- Red Hat Linux 6.2 - RHSA-2000:060 (2000-09-13)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0728
https://nvd.nist.gov/vuln/detail/CVE-2000-0728
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0750">
    <PublicDate>2000-08-08T00:00:00</PublicDate>
    <Bugzilla id="1616511" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616511" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:050 (2000-08-08)
- Red Hat Powertools 6.1 - RHSA-2000:050 (2000-08-08)
- Red Hat Powertools 6.2 - RHSA-2000:050 (2000-08-08)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0750
https://nvd.nist.gov/vuln/detail/CVE-2000-0750
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0751">
    <PublicDate>2000-08-08T00:00:00</PublicDate>
    <Bugzilla id="1616512" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616512" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:050 (2000-08-08)
- Red Hat Powertools 6.1 - RHSA-2000:050 (2000-08-08)
- Red Hat Powertools 6.2 - RHSA-2000:050 (2000-08-08)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0751
https://nvd.nist.gov/vuln/detail/CVE-2000-0751
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0787">
    <PublicDate>2000-08-17T00:00:00</PublicDate>
    <Bugzilla id="1616513" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616513" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 6.2 - RHSA-2000:055 (2000-08-22)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0787
https://nvd.nist.gov/vuln/detail/CVE-2000-0787
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0800">
    <Details source="Mitre" xml:lang="en:us">
String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue is a duplicate of CVE-2000-0666, which has been corrected via RHSA-2000:043.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0800
https://nvd.nist.gov/vuln/detail/CVE-2000-0800
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0816">
    <PublicDate>2000-10-06T00:00:00</PublicDate>
    <Bugzilla id="1616514" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616514" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.1 - RHSA-2000:080 (2000-11-08)
- Red Hat Linux 6.2 - RHSA-2000:080 (2000-11-08)
- Red Hat Linux 7.0 - RHSA-2000:080 (2000-11-08)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0816
https://nvd.nist.gov/vuln/detail/CVE-2000-0816
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0824">
    <PublicDate>1999-09-17T00:00:00</PublicDate>
    <Bugzilla id="1616515" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616515" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 5.1 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 5.2 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.0 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.1 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.2 - RHSA-2000:057 (2000-09-01)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0824
https://nvd.nist.gov/vuln/detail/CVE-2000-0824
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0829">
    <PublicDate>2000-09-09T00:00:00</PublicDate>
    <Bugzilla id="1616516" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616516" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.1 - RHSA-2000:080 (2000-11-08)
- Red Hat Linux 6.2 - RHSA-2000:080 (2000-11-08)
- Red Hat Linux 7.0 - RHSA-2000:080 (2000-11-08)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0829
https://nvd.nist.gov/vuln/detail/CVE-2000-0829
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0844">
    <PublicDate>2000-09-04T00:00:00</PublicDate>
    <Bugzilla id="1616517" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616517" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Some functions that implement the locale subsystem on Unix do not  properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 5.1 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 5.2 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.0 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.1 - RHSA-2000:057 (2000-09-01)
- Red Hat Linux 6.2 - RHSA-2000:057 (2000-09-01)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0844
https://nvd.nist.gov/vuln/detail/CVE-2000-0844
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0864">
    <PublicDate>2000-08-31T00:00:00</PublicDate>
    <Bugzilla id="1616518" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616518" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the creation of a Unix domain socket in GNOME esound 0.2.19 and earlier allows a local user to change the permissions of arbitrary files and directories, and gain additional privileges, via a  symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:077 (2000-10-06)
- Red Hat Linux 6.1 - RHSA-2000:077 (2000-10-06)
- Red Hat Linux 6.2 - RHSA-2000:077 (2000-10-06)
- Red Hat Linux 7.0 - RHSA-2000:077 (2000-10-06)
- Red Hat Linux 7.0j - RHSA-2000:077 (2000-10-06)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0864
https://nvd.nist.gov/vuln/detail/CVE-2000-0864
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0867">
    <PublicDate>2000-09-17T00:00:00</PublicDate>
    <Bugzilla id="1616519" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616519" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:061 (2000-09-18)
- Red Hat Linux 6.0 - RHSA-2000:061 (2000-09-18)
- Red Hat Linux 6.1 - RHSA-2000:061 (2000-09-18)
- Red Hat Linux 6.2 - RHSA-2000:061 (2000-09-18)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0867
https://nvd.nist.gov/vuln/detail/CVE-2000-0867
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0887">
    <PublicDate>2000-11-07T00:00:00</PublicDate>
    <Bugzilla id="1616520" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616520" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by making a compressed zone transfer (ZXFR) request and performing a name service query on an authoritative record that is not cached, aka the &quot;zxfr bug.&quot;
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.0 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.1 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.2 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 7.0 - RHSA-2000:107 (2000-11-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0887
https://nvd.nist.gov/vuln/detail/CVE-2000-0887
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0888">
    <PublicDate>2000-11-13T00:00:00</PublicDate>
    <Bugzilla id="1616521" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616521" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
named in BIND 8.2 through 8.2.2-P6 allows remote attackers to cause a denial of service by sending an SRV record to the server, aka the &quot;srv bug.&quot;
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.0 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.1 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 6.2 - RHSA-2000:107 (2000-11-16)
- Red Hat Linux 7.0 - RHSA-2000:107 (2000-11-16)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0888
https://nvd.nist.gov/vuln/detail/CVE-2000-0888
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0901">
    <PublicDate>2000-09-05T00:00:00</PublicDate>
    <Bugzilla id="1616522" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616522" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in screen 3.9.5 and earlier allows local users to gain root privileges via format characters in the vbell_msg initialization variable.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 5.2 - RHSA-2000:058 (2000-09-07)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0901
https://nvd.nist.gov/vuln/detail/CVE-2000-0901
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0909">
    <PublicDate>2000-09-22T00:00:00</PublicDate>
    <Bugzilla id="1616523" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616523" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:102 (2000-11-10)
- Red Hat Linux 6.0 - RHSA-2000:102 (2000-11-10)
- Red Hat Linux 6.1 - RHSA-2000:102 (2000-11-10)
- Red Hat Linux 6.2 - RHSA-2000:102 (2000-11-10)
- Red Hat Linux 7.0 - RHSA-2000:102 (2000-11-10)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0909
https://nvd.nist.gov/vuln/detail/CVE-2000-0909
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0913">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2000-09-29T00:00:00</PublicDate>
    <Bugzilla id="1616524" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616524" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_rewrite in Apache 1.3.12 and earlier allows remote attackers to read arbitrary files if a RewriteRule directive is expanded to include a filename whose name contains a regular expression.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.0 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.1 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.2 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 7.0 - RHSA-2000:088 (2000-10-23)
- Red Hat Secure Web Server 3.2 - RHSA-2000:095 (2000-10-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0913
https://nvd.nist.gov/vuln/detail/CVE-2000-0913
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0917">
    <PublicDate>2000-09-25T00:00:00</PublicDate>
    <Bugzilla id="1616525" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616525" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 7.0 - RHSA-2000:065 (2000-09-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0917
https://nvd.nist.gov/vuln/detail/CVE-2000-0917
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0934">
    <PublicDate>2000-09-20T00:00:00</PublicDate>
    <Bugzilla id="1616526" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616526" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Glint in Red Hat Linux 5.2 allows local users to overwrite arbitrary files and cause a denial of service via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 5.2 - RHSA-2000:062 (2000-09-19)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0934
https://nvd.nist.gov/vuln/detail/CVE-2000-0934
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0948">
    <PublicDate>2000-10-02T00:00:00</PublicDate>
    <Bugzilla id="1616527" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616527" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GnoRPM before 0.95 allows local users to modify arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.1 - RHSA-2000:072 (2000-12-01)
- Red Hat Linux 6.2 - RHSA-2000:072 (2000-12-01)
- Red Hat Linux 7.0 - RHSA-2000:072 (2000-12-01)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0948
https://nvd.nist.gov/vuln/detail/CVE-2000-0948
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0949">
    <PublicDate>2000-09-28T00:00:00</PublicDate>
    <Bugzilla id="1616528" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616528" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap overflow in savestr function in LBNL traceroute 1.4a5 and earlier allows a local user to execute arbitrary commands via the -g option.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:078 (2000-10-13)
- Red Hat Linux 5.1 - RHSA-2000:078 (2000-10-13)
- Red Hat Linux 5.2 - RHSA-2000:078 (2000-10-13)
- Red Hat Linux 6.0 - RHSA-2000:078 (2000-10-13)
- Red Hat Linux 6.1 - RHSA-2000:078 (2000-10-13)
- Red Hat Linux 6.2 - RHSA-2000:078 (2000-10-13)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0949
https://nvd.nist.gov/vuln/detail/CVE-2000-0949
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0956">
    <PublicDate>2000-10-26T00:00:00</PublicDate>
    <Bugzilla id="1616529" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616529" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cyrus-sasl before 1.5.24 in Red Hat Linux 7.0 does not properly verify the authorization for a local user, which could allow the users to bypass specified access restrictions.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 7.0 - RHSA-2000:094 (2000-10-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0956
https://nvd.nist.gov/vuln/detail/CVE-2000-0956
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0963">
    <PublicDate>2000-10-09T00:00:00</PublicDate>
    <Bugzilla id="1616530" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616530" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.2 - RHSA-2000:115 (2000-11-27)
- Red Hat Linux 7.0 - RHSA-2000:115 (2000-11-27)
- Red Hat Linux 7.0j - RHSA-2000:115 (2000-11-27)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0963
https://nvd.nist.gov/vuln/detail/CVE-2000-0963
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0967">
    <PublicDate>2000-10-12T00:00:00</PublicDate>
    <Bugzilla id="1616531" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616531" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.0 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.1 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 6.2 - RHSA-2000:088 (2000-10-23)
- Red Hat Linux 7.0 - RHSA-2000:088 (2000-10-23)
- Red Hat Secure Web Server 3.2 - RHSA-2000:095 (2000-10-26)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0967
https://nvd.nist.gov/vuln/detail/CVE-2000-0967
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0973">
    <PublicDate>2000-10-13T00:00:00</PublicDate>
    <Bugzilla id="1616532" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616532" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0973
https://nvd.nist.gov/vuln/detail/CVE-2000-0973
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-0974">
    <PublicDate>2000-10-11T00:00:00</PublicDate>
    <Bugzilla id="1616533" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616533" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.2 - RHSA-2000:089 (2000-10-20)
- Red Hat Linux 7.0 - RHSA-2000:089 (2000-10-20)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-0974
https://nvd.nist.gov/vuln/detail/CVE-2000-0974
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1040">
    <PublicDate>2000-10-18T00:00:00</PublicDate>
    <Bugzilla id="1616534" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616534" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in logging function of ypbind 3.3, while running in debug mode, leaks file descriptors and allows an attacker to cause a denial of service.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:086 (2000-11-08)
- Red Hat Linux 5.1 - RHSA-2000:086 (2000-11-08)
- Red Hat Linux 5.2 - RHSA-2000:086 (2000-11-08)
- Red Hat Linux 6.0 - RHSA-2000:086 (2000-11-08)
- Red Hat Linux 6.1 - RHSA-2000:086 (2000-11-08)
- Red Hat Linux 6.2 - RHSA-2000:086 (2000-11-08)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1040
https://nvd.nist.gov/vuln/detail/CVE-2000-1040
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1045">
    <PublicDate>2000-10-27T00:00:00</PublicDate>
    <Bugzilla id="1616535" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616535" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nss_ldap earlier than 121, when run with nscd (name service caching daemon), allows remote attackers to cause a denial of service via a flood of LDAP requests.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.1 - RHSA-2000:024 (2000-10-27)
- Red Hat Linux 6.2 - RHSA-2000:024 (2000-10-27)
- Red Hat Linux 7.0 - RHSA-2000:024 (2000-10-27)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1045
https://nvd.nist.gov/vuln/detail/CVE-2000-1045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1095">
    <PublicDate>2000-11-12T00:00:00</PublicDate>
    <Bugzilla id="1616536" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616536" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.2 - RHSA-2000:108 (2000-12-20)
- Red Hat Linux 7.0 - RHSA-2000:108 (2000-12-20)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1095
https://nvd.nist.gov/vuln/detail/CVE-2000-1095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1134">
    <PublicDate>2000-10-28T00:00:00</PublicDate>
    <Bugzilla id="1616537" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616537" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing &lt;&lt; redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2000-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:121">RHSA-2000:121</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1134
https://nvd.nist.gov/vuln/detail/CVE-2000-1134
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1137">
    <PublicDate>2000-11-29T00:00:00</PublicDate>
    <Bugzilla id="1616538" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616538" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2000-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:123">RHSA-2000:123</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2000-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:123">RHSA-2000:123</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2000-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:123">RHSA-2000:123</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:123">RHSA-2000:123</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:123">RHSA-2000:123</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1137
https://nvd.nist.gov/vuln/detail/CVE-2000-1137
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1162">
    <PublicDate>2000-11-22T00:00:00</PublicDate>
    <Bugzilla id="1616539" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616539" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ghostscript before 5.10-16 allows local users to overwrite files of other users via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 5.1 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 5.2 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 6.0 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 6.1 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 6.2 - RHSA-2000:114 (2000-11-22)
- Red Hat Linux 7.0 - RHSA-2000:114 (2000-11-22)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1162
https://nvd.nist.gov/vuln/detail/CVE-2000-1162
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1169">
    <PublicDate>2000-11-13T00:00:00</PublicDate>
    <Bugzilla id="1616540" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616540" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 7.0 - RHSA-2000:111 (2000-11-27)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1169
https://nvd.nist.gov/vuln/detail/CVE-2000-1169
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1174">
    <PublicDate>2000-11-18T00:00:00</PublicDate>
    <Bugzilla id="1616541" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616541" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in AFS ACL parser for Ethereal 0.8.13 and earlier allows remote attackers to execute arbitrary commands via a packet with a long username.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:116 (2000-12-05)
- Red Hat Powertools 6.1 - RHSA-2000:116 (2000-12-05)
- Red Hat Powertools 6.2 - RHSA-2000:116 (2000-12-05)
- Red Hat Powertools 7.0 - RHSA-2000:116 (2000-12-05)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1174
https://nvd.nist.gov/vuln/detail/CVE-2000-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1178">
    <PublicDate>2000-11-16T00:00:00</PublicDate>
    <Bugzilla id="1616542" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616542" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Joe text editor follows symbolic links when creating a rescue copy called DEADJOE during an abnormal exit, which allows local users to overwrite the files of other users whose joe session crashes.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.2 - RHSA-2000:110 (2000-11-20)
- Red Hat Linux 6.0 - RHSA-2000:110 (2000-11-20)
- Red Hat Linux 6.1 - RHSA-2000:110 (2000-11-20)
- Red Hat Linux 6.2 - RHSA-2000:110 (2000-11-20)
- Red Hat Linux 7.0 - RHSA-2000:110 (2000-11-20)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1178
https://nvd.nist.gov/vuln/detail/CVE-2000-1178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1187">
    <PublicDate>2000-11-27T00:00:00</PublicDate>
    <Bugzilla id="1616543" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616543" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the HTML parser for Netscape 4.75 and earlier allows remote attackers to execute arbitrary commands via a long password value in a form field.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:109 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:109 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:109 (2000-11-27)
- Red Hat Linux 7.0 - RHSA-2000:109 (2000-11-27)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1187
https://nvd.nist.gov/vuln/detail/CVE-2000-1187
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1189">
    <PublicDate>2000-12-01T00:00:00</PublicDate>
    <Bugzilla id="1616544" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616544" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:120 (2000-12-01)
- Red Hat Linux 6.1 - RHSA-2000:120 (2000-12-01)
- Red Hat Linux 6.2 - RHSA-2000:120 (2000-12-01)
- Red Hat Linux 7.0 - RHSA-2000:120 (2000-12-01)
- Red Hat Linux 7.0j - RHSA-2000:120 (2000-12-01)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1189
https://nvd.nist.gov/vuln/detail/CVE-2000-1189
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1190">
    <PublicDate>2000-05-31T00:00:00</PublicDate>
    <Bugzilla id="1616545" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616545" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
imwheel-solo in imwheel package allows local users to modify arbitrary files via a symlink attack from the .imwheelrc file.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.1 - RHSA-2000:016 (2000-04-21)
- Red Hat Powertools 6.2 - RHSA-2000:016 (2000-04-21)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1190
https://nvd.nist.gov/vuln/detail/CVE-2000-1190
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1191">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2000-04-18T00:00:00</PublicDate>
    <Bugzilla id="1616546" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616546" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0026">RHBA-2007:0026</Advisory>
        <Package name="htdig">htdig-2:3.1.6-7.el3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1191
https://nvd.nist.gov/vuln/detail/CVE-2000-1191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1199">
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL stores usernames and passwords in plaintext in (1) pg_shadow and (2) pg_pwd, which allows attackers with sufficient privileges to gain access to databases.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1199
https://nvd.nist.gov/vuln/detail/CVE-2000-1199
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1207">
    <PublicDate>2000-09-30T00:00:00</PublicDate>
    <Bugzilla id="1616547" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616547" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.0 - RHSA-2000:075 (2000-12-01)
- Red Hat Linux 6.1 - RHSA-2000:075 (2000-12-01)
- Red Hat Linux 6.2 - RHSA-2000:075 (2000-12-01)
- Red Hat Linux 7.0 - RHSA-2000:075 (2000-12-01)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1207
https://nvd.nist.gov/vuln/detail/CVE-2000-1207
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1208">
    <PublicDate>2000-05-31T00:00:00</PublicDate>
    <Bugzilla id="1616548" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616548" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 5.0 - RHSA-2000:066 (2000-10-13)
- Red Hat Linux 5.1 - RHSA-2000:066 (2000-10-13)
- Red Hat Linux 5.2 - RHSA-2000:066 (2000-10-13)
- Red Hat Linux 6.0 - RHSA-2000:066 (2000-10-13)
- Red Hat Linux 6.1 - RHSA-2000:066 (2000-10-13)
- Red Hat Linux 6.2 - RHSA-2000:066 (2000-10-13)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1208
https://nvd.nist.gov/vuln/detail/CVE-2000-1208
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1211">
    <PublicDate>2000-12-22T00:00:00</PublicDate>
    <Bugzilla id="1616549" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616549" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2000-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:125">RHSA-2000:125</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2000-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:125">RHSA-2000:125</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1211
https://nvd.nist.gov/vuln/detail/CVE-2000-1211
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1212">
    <PublicDate>2000-12-18T00:00:00</PublicDate>
    <Bugzilla id="1616550" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616550" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:135">RHSA-2000:135</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:135">RHSA-2000:135</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1212
https://nvd.nist.gov/vuln/detail/CVE-2000-1212
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1213">
    <PublicDate>2000-10-18T00:00:00</PublicDate>
    <Bugzilla id="1616551" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616551" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.2 - RHSA-2000:087 (2000-10-18)
- Red Hat Linux 7.0 - RHSA-2000:087 (2000-10-18)
- Red Hat Linux 7.0j - RHSA-2000:087 (2000-10-18)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1213
https://nvd.nist.gov/vuln/detail/CVE-2000-1213
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1214">
    <PublicDate>2000-10-18T00:00:00</PublicDate>
    <Bugzilla id="1616552" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616552" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Linux 6.2 - RHSA-2000:087 (2000-10-18)
- Red Hat Linux 7.0 - RHSA-2000:087 (2000-10-18)
- Red Hat Linux 7.0j - RHSA-2000:087 (2000-10-18)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1214
https://nvd.nist.gov/vuln/detail/CVE-2000-1214
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1220">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2000-01-08T00:00:00</PublicDate>
    <Bugzilla id="1616553" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616553" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1220
https://nvd.nist.gov/vuln/detail/CVE-2000-1220
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1221">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2000-01-08T00:00:00</PublicDate>
    <Bugzilla id="1616554" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616554" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1221
https://nvd.nist.gov/vuln/detail/CVE-2000-1221
    </References>
</Vulnerability>

<Vulnerability name="CVE-2000-1254">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2000-06-01T00:00:00</PublicDate>
    <Bugzilla id="1333287" url="https://bugzilla.redhat.com/show_bug.cgi?id=1333287" xml:lang="en:us">
openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl097a</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_application_platform:6">
        <ProductName>Red Hat JBoss Enterprise Application Platform 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:1">
        <ProductName>Red Hat JBoss Enterprise Web Server 1</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:3">
        <ProductName>Red Hat JBoss Enterprise Web Server 3</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2000-1254
https://nvd.nist.gov/vuln/detail/CVE-2000-1254
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0010">
    <PublicDate>2001-01-29T00:00:00</PublicDate>
    <Bugzilla id="1616555" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616555" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0010
https://nvd.nist.gov/vuln/detail/CVE-2001-0010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0011">
    <PublicDate>2001-01-29T00:00:00</PublicDate>
    <Bugzilla id="1616556" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616556" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0011
https://nvd.nist.gov/vuln/detail/CVE-2001-0011
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0012">
    <PublicDate>2001-01-29T00:00:00</PublicDate>
    <Bugzilla id="1616557" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616557" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0012
https://nvd.nist.gov/vuln/detail/CVE-2001-0012
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0013">
    <PublicDate>2001-01-29T00:00:00</PublicDate>
    <Bugzilla id="1616558" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616558" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:007">RHSA-2001:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0013
https://nvd.nist.gov/vuln/detail/CVE-2001-0013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0026">
    <PublicDate>2000-12-11T00:00:00</PublicDate>
    <Bugzilla id="1616559" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616559" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rp-pppoe PPPoE client allows remote attackers to cause a denial of service via the Clamp MSS option and a TCP packet with a zero-length TCP option.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following product:

- Red Hat Linux 7.0 - RHSA-2000:130 (2000-12-19)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0026
https://nvd.nist.gov/vuln/detail/CVE-2001-0026
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0036">
    <PublicDate>2000-12-08T00:00:00</PublicDate>
    <Bugzilla id="1616560" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616560" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:025">RHSA-2001:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:025">RHSA-2001:025</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0036
https://nvd.nist.gov/vuln/detail/CVE-2001-0036
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0050">
    <PublicDate>2000-12-07T00:00:00</PublicDate>
    <Bugzilla id="1616561" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616561" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in BitchX IRC client allows remote attackers to cause a denial of service and possibly execute arbitrary commands via an IP address that resolves to a long DNS hostname or domain name.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in the following products:

- Red Hat Powertools 6.0 - RHSA-2000:126 (2000-12-19)
- Red Hat Powertools 6.1 - RHSA-2000:126 (2000-12-19)
- Red Hat Powertools 6.2 - RHSA-2000:126 (2000-12-19)
- Red Hat Powertools 7.0 - RHSA-2000:126 (2000-12-19)
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0050
https://nvd.nist.gov/vuln/detail/CVE-2001-0050
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0060">
    <PublicDate>2000-12-18T00:00:00</PublicDate>
    <Bugzilla id="1616562" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616562" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:129">RHSA-2000:129</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0060
https://nvd.nist.gov/vuln/detail/CVE-2001-0060
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0066">
    <PublicDate>2000-11-26T00:00:00</PublicDate>
    <Bugzilla id="1616563" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616563" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:128">RHSA-2000:128</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:128">RHSA-2000:128</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:128">RHSA-2000:128</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:128">RHSA-2000:128</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0066
https://nvd.nist.gov/vuln/detail/CVE-2001-0066
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0071">
    <PublicDate>2000-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616564" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616564" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:131">RHSA-2000:131</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:131">RHSA-2000:131</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0071
https://nvd.nist.gov/vuln/detail/CVE-2001-0071
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0072">
    <PublicDate>2000-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616565" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616565" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:131">RHSA-2000:131</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:131">RHSA-2000:131</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0072
https://nvd.nist.gov/vuln/detail/CVE-2001-0072
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0101">
    <PublicDate>2000-12-27T00:00:00</PublicDate>
    <Bugzilla id="1616566" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616566" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in fetchmail 5.5.0-2 and earlier in the AUTHENTICATE GSSAPI command.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0101
https://nvd.nist.gov/vuln/detail/CVE-2001-0101
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0108">
    <PublicDate>2001-01-12T00:00:00</PublicDate>
    <Bugzilla id="1616567" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616567" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0108
https://nvd.nist.gov/vuln/detail/CVE-2001-0108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0117">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-01-10T00:00:00</PublicDate>
    <Bugzilla id="1616568" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616568" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:116">RHSA-2001:116</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:116">RHSA-2001:116</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:116">RHSA-2001:116</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:116">RHSA-2001:116</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0117
https://nvd.nist.gov/vuln/detail/CVE-2001-0117
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0128">
    <PublicDate>2000-12-16T00:00:00</PublicDate>
    <Bugzilla id="1616569" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616569" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.1">
        <ProductName>Red Hat Powertools 6.1</ProductName>
        <ReleaseDate>2000-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:127">RHSA-2000:127</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2000-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:127">RHSA-2000:127</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2000-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:127">RHSA-2000:127</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0128
https://nvd.nist.gov/vuln/detail/CVE-2001-0128
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0131">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-01-10T00:00:00</PublicDate>
    <Bugzilla id="1886967" url="https://bugzilla.redhat.com/show_bug.cgi?id=1886967" xml:lang="en:us">
httpd: allows local users to overwrite arbitrary files via a symlink attack
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>2.9</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-59</CWE>
    <Details source="Mitre" xml:lang="en:us">
htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.
    </Details>
    <Statement xml:lang="en:us">
All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd:2.4/httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>httpd22</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:3">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd24-httpd</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0131
https://nvd.nist.gov/vuln/detail/CVE-2001-0131
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0141">
    <PublicDate>2001-01-10T00:00:00</PublicDate>
    <Bugzilla id="1616570" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616570" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mgetty 1.1.22 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:050">RHSA-2001:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:050">RHSA-2001:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:050">RHSA-2001:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:050">RHSA-2001:050</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0141
https://nvd.nist.gov/vuln/detail/CVE-2001-0141
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0169">
    <PublicDate>2001-01-16T00:00:00</PublicDate>
    <Bugzilla id="1616571" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616571" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2001-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:002">RHSA-2001:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2001-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:002">RHSA-2001:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:002">RHSA-2001:002</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0169
https://nvd.nist.gov/vuln/detail/CVE-2001-0169
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0170">
    <PublicDate>2001-01-10T00:00:00</PublicDate>
    <Bugzilla id="1616572" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616572" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:001">RHSA-2001:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0170
https://nvd.nist.gov/vuln/detail/CVE-2001-0170
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0187">
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in wu-ftp 2.6.1 and earlier, when running with debug mode enabled, allows remote attackers to execute arbitrary commands via a malformed argument that is recorded in a PASV port assignment.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 2.1 ships with wu-ftp version 2.6.2 which is not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0187
https://nvd.nist.gov/vuln/detail/CVE-2001-0187
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0191">
    <PublicDate>2001-02-02T00:00:00</PublicDate>
    <Bugzilla id="1616573" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616573" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:010">RHSA-2001:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:011">RHSA-2001:011</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0191
https://nvd.nist.gov/vuln/detail/CVE-2001-0191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0197">
    <PublicDate>2001-01-21T00:00:00</PublicDate>
    <Bugzilla id="1616574" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616574" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:004">RHSA-2001:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:004">RHSA-2001:004</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0197
https://nvd.nist.gov/vuln/detail/CVE-2001-0197
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0233">
    <PublicDate>2001-01-18T00:00:00</PublicDate>
    <Bugzilla id="1616575" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616575" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:005">RHSA-2001:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:005">RHSA-2001:005</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0233
https://nvd.nist.gov/vuln/detail/CVE-2001-0233
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0279">
    <PublicDate>2001-02-22T00:00:00</PublicDate>
    <Bugzilla id="1616576" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616576" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:018">RHSA-2001:018</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:019">RHSA-2001:019</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0279
https://nvd.nist.gov/vuln/detail/CVE-2001-0279
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0289">
    <PublicDate>2001-02-28T00:00:00</PublicDate>
    <Bugzilla id="1616577" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616577" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:024">RHSA-2001:024</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:024">RHSA-2001:024</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:024">RHSA-2001:024</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0289
https://nvd.nist.gov/vuln/detail/CVE-2001-0289
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0301">
    <PublicDate>2001-02-13T00:00:00</PublicDate>
    <Bugzilla id="1616578" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616578" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Analog before 4.16 allows remote attackers to execute arbitrary commands by using the ALIAS command to construct large strings.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:2.0">
        <ProductName>Red Hat Secure Web Server 2.0</ProductName>
        <ReleaseDate>2001-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:017">RHSA-2001:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0301
https://nvd.nist.gov/vuln/detail/CVE-2001-0301
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0309">
    <PublicDate>2001-01-30T00:00:00</PublicDate>
    <Bugzilla id="1616579" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616579" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:006">RHSA-2001:006</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0309
https://nvd.nist.gov/vuln/detail/CVE-2001-0309
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0316">
    <PublicDate>2001-02-08T00:00:00</PublicDate>
    <Bugzilla id="1616580" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616580" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4 and 2.2 allows local users to read kernel memory and possibly gain privileges via a negative argument to the sysctl call.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0316
https://nvd.nist.gov/vuln/detail/CVE-2001-0316
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0317">
    <PublicDate>2001-02-08T00:00:00</PublicDate>
    <Bugzilla id="1616581" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616581" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0317
https://nvd.nist.gov/vuln/detail/CVE-2001-0317
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0328">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-05-01T00:00:00</PublicDate>
    <Bugzilla id="963594" url="https://bugzilla.redhat.com/show_bug.cgi?id=963594" xml:lang="en:us">
kernel: TCP connection ISN hijacks
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
    </Details>
    <Statement xml:lang="en:us">
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_mrg:2">
        <ProductName>Red Hat Enterprise MRG 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0328
https://nvd.nist.gov/vuln/detail/CVE-2001-0328
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0381">
    <PublicDate>2001-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616582" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616582" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:063">RHSA-2001:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:063">RHSA-2001:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:063">RHSA-2001:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0381
https://nvd.nist.gov/vuln/detail/CVE-2001-0381
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0405">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-04-16T00:00:00</PublicDate>
    <Bugzilla id="1616583" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616583" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:084">RHSA-2001:084</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0405
https://nvd.nist.gov/vuln/detail/CVE-2001-0405
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0406">
    <PublicDate>2001-04-17T00:00:00</PublicDate>
    <Bugzilla id="1616584" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616584" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:044">RHSA-2001:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:044">RHSA-2001:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:044">RHSA-2001:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:044">RHSA-2001:044</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0406
https://nvd.nist.gov/vuln/detail/CVE-2001-0406
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0408">
    <PublicDate>2001-03-26T00:00:00</PublicDate>
    <Bugzilla id="1616585" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616585" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:008">RHSA-2001:008</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:008">RHSA-2001:008</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:008">RHSA-2001:008</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0408
https://nvd.nist.gov/vuln/detail/CVE-2001-0408
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0414">
    <PublicDate>2001-04-04T00:00:00</PublicDate>
    <Bugzilla id="34813" url="https://bugzilla.redhat.com/show_bug.cgi?id=34813" xml:lang="en:us">
ntpd security hole
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:045">RHSA-2001:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:045">RHSA-2001:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:045">RHSA-2001:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0414
https://nvd.nist.gov/vuln/detail/CVE-2001-0414
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0416">
    <PublicDate>2001-03-08T00:00:00</PublicDate>
    <Bugzilla id="1616586" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616586" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:027">RHSA-2001:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:027">RHSA-2001:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:027">RHSA-2001:027</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0416
https://nvd.nist.gov/vuln/detail/CVE-2001-0416
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0417">
    <PublicDate>2001-03-07T00:00:00</PublicDate>
    <Bugzilla id="1616587" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616587" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kerberos 4 (aka krb4) allows local users to overwrite arbitrary files via a symlink attack on new ticket files.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0417
https://nvd.nist.gov/vuln/detail/CVE-2001-0417
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0439">
    <PublicDate>2001-04-20T00:00:00</PublicDate>
    <Bugzilla id="1616588" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616588" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
licq before 1.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:022">RHSA-2001:022</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:023">RHSA-2001:023</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0439
https://nvd.nist.gov/vuln/detail/CVE-2001-0439
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0440">
    <PublicDate>2001-04-20T00:00:00</PublicDate>
    <Bugzilla id="1616589" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616589" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:022">RHSA-2001:022</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:023">RHSA-2001:023</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0440
https://nvd.nist.gov/vuln/detail/CVE-2001-0440
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0441">
    <PublicDate>2001-03-09T00:00:00</PublicDate>
    <Bugzilla id="1616590" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616590" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:028">RHSA-2001:028</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:028">RHSA-2001:028</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0441
https://nvd.nist.gov/vuln/detail/CVE-2001-0441
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0473">
    <PublicDate>2001-03-09T00:00:00</PublicDate>
    <Bugzilla id="1616591" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616591" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:029">RHSA-2001:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:029">RHSA-2001:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:029">RHSA-2001:029</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0473
https://nvd.nist.gov/vuln/detail/CVE-2001-0473
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0489">
    <PublicDate>2001-04-17T00:00:00</PublicDate>
    <Bugzilla id="1616592" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616592" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:053">RHSA-2001:053</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:053">RHSA-2001:053</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:053">RHSA-2001:053</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0489
https://nvd.nist.gov/vuln/detail/CVE-2001-0489
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0496">
    <PublicDate>2001-04-30T00:00:00</PublicDate>
    <Bugzilla id="1616593" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616593" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
kdesu in kdelibs package creates world readable temporary files containing authentication info, which can allow local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:059">RHSA-2001:059</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0496
https://nvd.nist.gov/vuln/detail/CVE-2001-0496
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0514">
    <Details source="Mitre" xml:lang="en:us">
SNMP service in Atmel 802.11b VNET-B Access Point 1.3 and earlier, as used in Netgear ME102 and Linksys WAP11, accepts arbitrary community strings with requested MIB modifications, which allows remote attackers to obtain sensitive information such as WEP keys, cause a denial of service, or gain access to the network.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the version of atmel-firmware as shipped with Red Hat Enterprise Linux 6 as it did not implement the SNMP protocol support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0514
https://nvd.nist.gov/vuln/detail/CVE-2001-0514
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0522">
    <PublicDate>2001-05-29T00:00:00</PublicDate>
    <Bugzilla id="1616594" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616594" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:073">RHSA-2001:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:073">RHSA-2001:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:073">RHSA-2001:073</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0522
https://nvd.nist.gov/vuln/detail/CVE-2001-0522
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0550">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2001-04-30T00:00:00</PublicDate>
    <Bugzilla id="1616595" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616595" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a &quot;~{&quot; argument to commands such as CWD, which is not properly handled by the glob function (ftpglob).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:157">RHSA-2001:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:157">RHSA-2001:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:157">RHSA-2001:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:157">RHSA-2001:157</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0550
https://nvd.nist.gov/vuln/detail/CVE-2001-0550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0554">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2001-07-18T00:00:00</PublicDate>
    <Bugzilla id="1616596" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616596" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:099">RHSA-2001:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:099">RHSA-2001:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:100">RHSA-2001:100</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:099">RHSA-2001:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:100">RHSA-2001:100</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:099">RHSA-2001:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:100">RHSA-2001:100</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0554
https://nvd.nist.gov/vuln/detail/CVE-2001-0554
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0556">
    <PublicDate>2001-03-01T00:00:00</PublicDate>
    <Bugzilla id="1616597" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616597" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:061">RHSA-2001:061</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:061">RHSA-2001:061</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:061">RHSA-2001:061</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0556
https://nvd.nist.gov/vuln/detail/CVE-2001-0556
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0560">
    <PublicDate>2001-02-10T00:00:00</PublicDate>
    <Bugzilla id="1616598" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616598" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (&gt; 20 characters).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:014">RHSA-2001:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:014">RHSA-2001:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:014">RHSA-2001:014</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0560
https://nvd.nist.gov/vuln/detail/CVE-2001-0560
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0567">
    <PublicDate>2001-05-02T00:00:00</PublicDate>
    <Bugzilla id="1616599" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616599" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:065">RHSA-2001:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:065">RHSA-2001:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:065">RHSA-2001:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0567
https://nvd.nist.gov/vuln/detail/CVE-2001-0567
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0568">
    <PublicDate>2001-02-23T00:00:00</PublicDate>
    <Bugzilla id="1616600" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616600" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:021">RHSA-2001:021</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:021">RHSA-2001:021</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0568
https://nvd.nist.gov/vuln/detail/CVE-2001-0568
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0569">
    <PublicDate>2001-02-23T00:00:00</PublicDate>
    <Bugzilla id="1616601" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616601" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:021">RHSA-2001:021</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:021">RHSA-2001:021</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0569
https://nvd.nist.gov/vuln/detail/CVE-2001-0569
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0570">
    <PublicDate>2001-05-03T00:00:00</PublicDate>
    <Bugzilla id="1616602" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616602" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:067">RHSA-2001:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:067">RHSA-2001:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:067">RHSA-2001:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:067">RHSA-2001:067</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0570
https://nvd.nist.gov/vuln/detail/CVE-2001-0570
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0572">
    <PublicDate>2001-03-18T00:00:00</PublicDate>
    <Bugzilla id="1616603" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616603" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:033">RHSA-2001:033</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0572
https://nvd.nist.gov/vuln/detail/CVE-2001-0572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0596">
    <PublicDate>2001-04-09T00:00:00</PublicDate>
    <Bugzilla id="1616604" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616604" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:046">RHSA-2001:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:046">RHSA-2001:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:046">RHSA-2001:046</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0596
https://nvd.nist.gov/vuln/detail/CVE-2001-0596
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0635">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-05-02T00:00:00</PublicDate>
    <Bugzilla id="1616605" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616605" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:058">RHSA-2001:058</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0635
https://nvd.nist.gov/vuln/detail/CVE-2001-0635
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0641">
    <PublicDate>2001-05-13T00:00:00</PublicDate>
    <Bugzilla id="1616606" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616606" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:069">RHSA-2001:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:069">RHSA-2001:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:069">RHSA-2001:069</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0641
https://nvd.nist.gov/vuln/detail/CVE-2001-0641
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0653">
    <PublicDate>2001-08-21T00:00:00</PublicDate>
    <Bugzilla id="1616607" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616607" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0653
https://nvd.nist.gov/vuln/detail/CVE-2001-0653
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0670">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616608" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616608" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:147">RHSA-2001:147</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0670
https://nvd.nist.gov/vuln/detail/CVE-2001-0670
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0690">
    <PublicDate>2001-06-06T00:00:00</PublicDate>
    <Bugzilla id="1616609" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616609" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:078">RHSA-2001:078</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:078">RHSA-2001:078</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:078">RHSA-2001:078</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0690
https://nvd.nist.gov/vuln/detail/CVE-2001-0690
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0691">
    <PublicDate>2001-06-11T00:00:00</PublicDate>
    <Bugzilla id="1616610" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616610" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:094">RHSA-2001:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:094">RHSA-2001:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:094">RHSA-2001:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:094">RHSA-2001:094</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0691
https://nvd.nist.gov/vuln/detail/CVE-2001-0691
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0730">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2001-09-28T00:00:00</PublicDate>
    <Bugzilla id="1616611" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616611" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
split-logfile in Apache 1.3.20 allows remote attackers to overwrite arbitrary files that end in the .log extension via an HTTP request with a / (slash) in the Host: header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:164">RHSA-2001:164</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0730
https://nvd.nist.gov/vuln/detail/CVE-2001-0730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0731">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-07-09T00:00:00</PublicDate>
    <Bugzilla id="1616612" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616612" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the &quot;M=D&quot; query string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:126">RHSA-2001:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:164">RHSA-2001:164</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0731
https://nvd.nist.gov/vuln/detail/CVE-2001-0731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0736">
    <PublicDate>2001-03-31T00:00:00</PublicDate>
    <Bugzilla id="1616613" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616613" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:042">RHSA-2001:042</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:042">RHSA-2001:042</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:042">RHSA-2001:042</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0736
https://nvd.nist.gov/vuln/detail/CVE-2001-0736
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0763">
    <PublicDate>2001-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616614" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616614" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:075">RHSA-2001:075</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:075">RHSA-2001:075</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0763
https://nvd.nist.gov/vuln/detail/CVE-2001-0763
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0775">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-07-10T00:00:00</PublicDate>
    <Bugzilla id="1616616" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616616" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:088">RHSA-2001:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:088">RHSA-2001:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:088">RHSA-2001:088</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0775
https://nvd.nist.gov/vuln/detail/CVE-2001-0775
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0784">
    <PublicDate>2001-06-26T00:00:00</PublicDate>
    <Bugzilla id="1616617" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616617" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in Icecast 1.3.10 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot)  attack using encoded URL characters.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0784
https://nvd.nist.gov/vuln/detail/CVE-2001-0784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0787">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-06-12T00:00:00</PublicDate>
    <Bugzilla id="1616618" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616618" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-06-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:077">RHSA-2001:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:077">RHSA-2001:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0787
https://nvd.nist.gov/vuln/detail/CVE-2001-0787
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0816">
    <PublicDate>2001-09-18T00:00:00</PublicDate>
    <Bugzilla id="1616619" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616619" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:154">RHSA-2001:154</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:154">RHSA-2001:154</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:154">RHSA-2001:154</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0816
https://nvd.nist.gov/vuln/detail/CVE-2001-0816
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0819">
    <PublicDate>2001-06-10T00:00:00</PublicDate>
    <Bugzilla id="1616620" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616620" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A buffer overflow in Linux fetchmail before 5.8.6 allows remote attackers to execute arbitrary code via a large 'To:' field in an email header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0819
https://nvd.nist.gov/vuln/detail/CVE-2001-0819
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0825">
    <PublicDate>2001-07-02T00:00:00</PublicDate>
    <Bugzilla id="1616621" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616621" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:092">RHSA-2001:092</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:092">RHSA-2001:092</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0825
https://nvd.nist.gov/vuln/detail/CVE-2001-0825
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0834">
    <PublicDate>2001-10-07T00:00:00</PublicDate>
    <Bugzilla id="1616622" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616622" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:139">RHSA-2001:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:139">RHSA-2001:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0834
https://nvd.nist.gov/vuln/detail/CVE-2001-0834
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0835">
    <PublicDate>2001-10-24T00:00:00</PublicDate>
    <Bugzilla id="1616623" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616623" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in Webalizer 2.01-06, and possibly other versions, allows remote attackers to inject arbitrary HTML tags by specifying them in (1) search keywords embedded in HTTP referrer information, or (2) host names that are retrieved via a reverse DNS lookup.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:140">RHSA-2001:140</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:141">RHSA-2001:141</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:141">RHSA-2001:141</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0835
https://nvd.nist.gov/vuln/detail/CVE-2001-0835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0843">
    <PublicDate>2001-09-21T00:00:00</PublicDate>
    <Bugzilla id="1616624" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616624" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:113">RHSA-2001:113</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:113">RHSA-2001:113</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:113">RHSA-2001:113</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:113">RHSA-2001:113</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0843
https://nvd.nist.gov/vuln/detail/CVE-2001-0843
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0851">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-11-02T00:00:00</PublicDate>
    <Bugzilla id="1616625" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616625" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0851
https://nvd.nist.gov/vuln/detail/CVE-2001-0851
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0852">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-11-05T00:00:00</PublicDate>
    <Bugzilla id="1616626" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616626" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:142">RHSA-2001:142</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0852
https://nvd.nist.gov/vuln/detail/CVE-2001-0852
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0859">
    <PublicDate>2001-11-13T00:00:00</PublicDate>
    <Bugzilla id="1616627" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616627" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1k">
        <ProductName>Red Hat Linux 7.1k</ProductName>
        <ReleaseDate>2001-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:148">RHSA-2001:148</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0859
https://nvd.nist.gov/vuln/detail/CVE-2001-0859
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0869">
    <PublicDate>2001-11-02T00:00:00</PublicDate>
    <Bugzilla id="1616628" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616628" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:150">RHSA-2001:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:150">RHSA-2001:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:150">RHSA-2001:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:151">RHSA-2001:151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0869
https://nvd.nist.gov/vuln/detail/CVE-2001-0869
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0872">
    <PublicDate>2001-12-04T00:00:00</PublicDate>
    <Bugzilla id="1616629" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616629" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:161">RHSA-2001:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:161">RHSA-2001:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:161">RHSA-2001:161</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0872
https://nvd.nist.gov/vuln/detail/CVE-2001-0872
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0873">
    <PublicDate>2001-09-08T00:00:00</PublicDate>
    <Bugzilla id="1616630" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616630" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
uuxqt in Taylor UUCP package does not properly remove dangerous long options, which allows local users to gain privileges by calling uux and specifying an alternate configuration file with the --config option.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:165">RHSA-2001:165</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:165">RHSA-2001:165</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:165">RHSA-2001:165</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:165">RHSA-2001:165</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0873
https://nvd.nist.gov/vuln/detail/CVE-2001-0873
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0884">
    <PublicDate>2001-11-28T00:00:00</PublicDate>
    <Bugzilla id="1616631" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616631" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:168">RHSA-2001:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:169">RHSA-2001:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:169">RHSA-2001:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-01-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:170">RHSA-2001:170</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0884
https://nvd.nist.gov/vuln/detail/CVE-2001-0884
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0886">
    <PublicDate>2001-12-14T00:00:00</PublicDate>
    <Bugzilla id="1616632" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616632" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace &quot;{&quot; character.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-12-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:160">RHSA-2001:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-12-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:160">RHSA-2001:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-12-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:160">RHSA-2001:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-12-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:160">RHSA-2001:160</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0886
https://nvd.nist.gov/vuln/detail/CVE-2001-0886
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0887">
    <PublicDate>2001-12-17T00:00:00</PublicDate>
    <Bugzilla id="1616633" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616633" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.0">
        <ProductName>Red Hat Powertools 6.0</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.1">
        <ProductName>Red Hat Powertools 6.1</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0887
https://nvd.nist.gov/vuln/detail/CVE-2001-0887
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0889">
    <PublicDate>2002-01-08T00:00:00</PublicDate>
    <Bugzilla id="1616634" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616634" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:176">RHSA-2001:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:176">RHSA-2001:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:176">RHSA-2001:176</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0889
https://nvd.nist.gov/vuln/detail/CVE-2001-0889
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0890">
    <PublicDate>2001-12-17T00:00:00</PublicDate>
    <Bugzilla id="1616635" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616635" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:171">RHSA-2001:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.0">
        <ProductName>Red Hat Powertools 6.0</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.1">
        <ProductName>Red Hat Powertools 6.1</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:172">RHSA-2001:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0890
https://nvd.nist.gov/vuln/detail/CVE-2001-0890
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0894">
    <PublicDate>2001-11-15T00:00:00</PublicDate>
    <Bugzilla id="1616636" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616636" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:156">RHSA-2001:156</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0894
https://nvd.nist.gov/vuln/detail/CVE-2001-0894
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0905">
    <PublicDate>2001-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616637" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616637" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:093">RHSA-2001:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:093">RHSA-2001:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:093">RHSA-2001:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:093">RHSA-2001:093</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0905
https://nvd.nist.gov/vuln/detail/CVE-2001-0905
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0906">
    <PublicDate>2001-06-22T00:00:00</PublicDate>
    <Bugzilla id="1616638" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616638" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
teTeX filter before 1.0.7 allows local users to gain privileges via a symlink attack on temporary files that are produced when printing .dvi files using lpr.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0906
https://nvd.nist.gov/vuln/detail/CVE-2001-0906
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0935">
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in wu-ftpd 2.6.0, and possibly earlier versions, which is unrelated to the ftpglob bug described in CVE-2001-0550.
    </Details>
    <Statement xml:lang="en:us">
CVE-2001-0935 refers to vulnerabilities found when SUSE did a code audit of the wu-ftpd glob.c file in wu-ftpd 2.6.0. They shared these details with the wu-ftpd upstream authors who clarified that some of the issues did not apply, and all were addressed by the version of glob.c in upstream wu-ftpd 2.6.1. Therefore we believe that the issues labelled as CVE-2001-0935 do not affect wu-ftpd 2.6.1 or later versions and therefore do not affect Red Hat Enterprise Linux 2.1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0935
https://nvd.nist.gov/vuln/detail/CVE-2001-0935
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-0977">
    <PublicDate>2001-07-16T00:00:00</PublicDate>
    <Bugzilla id="1616639" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616639" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:098">RHSA-2001:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:098">RHSA-2001:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:098">RHSA-2001:098</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-0977
https://nvd.nist.gov/vuln/detail/CVE-2001-0977
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1002">
    <PublicDate>2001-08-27T00:00:00</PublicDate>
    <Bugzilla id="1616640" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616640" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:102">RHSA-2001:102</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1002
https://nvd.nist.gov/vuln/detail/CVE-2001-1002
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1009">
    <PublicDate>2001-08-09T00:00:00</PublicDate>
    <Bugzilla id="1616641" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616641" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Fetchmail (aka fetchmail-ssl) before 5.8.17 allows a remote malicious (1) IMAP server or (2) POP/POP3 server to overwrite arbitrary memory and possibly gain privileges via a negative index number as part of a response to a LIST request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1009
https://nvd.nist.gov/vuln/detail/CVE-2001-1009
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1013">
    <Details source="Mitre" xml:lang="en:us">
Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid usernames on the server.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw to be a security issue. If UserDir is enabled, you can configure httpd to respond with a custom error page and a single error code whether the user exists or not.

The UserDir functionality is disabled by default in httpd on Red Hat Enterprise Linux 5, 6, and 7, and is thus not exposed on default installations.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1013
https://nvd.nist.gov/vuln/detail/CVE-2001-1013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1022">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-07-27T00:00:00</PublicDate>
    <Bugzilla id="1616642" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616642" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in pic utility in groff 1.16.1 and other versions, and jgroff before 1.15, allows remote attackers to bypass the -S option and execute arbitrary commands via format string specifiers in the plot command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1022
https://nvd.nist.gov/vuln/detail/CVE-2001-1022
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1028">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-09-21T00:00:00</PublicDate>
    <Bugzilla id="1616643" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616643" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1028
https://nvd.nist.gov/vuln/detail/CVE-2001-1028
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1030">
    <PublicDate>2001-07-18T00:00:00</PublicDate>
    <Bugzilla id="1616644" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616644" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:097">RHSA-2001:097</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1030
https://nvd.nist.gov/vuln/detail/CVE-2001-1030
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1083">
    <PublicDate>2001-06-26T00:00:00</PublicDate>
    <Bugzilla id="1616645" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616645" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1083
https://nvd.nist.gov/vuln/detail/CVE-2001-1083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1141">
    <PublicDate>2001-07-10T00:00:00</PublicDate>
    <Bugzilla id="1616646" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616646" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1141
https://nvd.nist.gov/vuln/detail/CVE-2001-1141
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1147">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-10-08T00:00:00</PublicDate>
    <Bugzilla id="1616647" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616647" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:132">RHSA-2001:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:132">RHSA-2001:132</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1147
https://nvd.nist.gov/vuln/detail/CVE-2001-1147
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1162">
    <PublicDate>2001-06-23T00:00:00</PublicDate>
    <Bugzilla id="1616648" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616648" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:086">RHSA-2001:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:086">RHSA-2001:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:086">RHSA-2001:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:086">RHSA-2001:086</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1162
https://nvd.nist.gov/vuln/detail/CVE-2001-1162
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1174">
    <PublicDate>2001-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616649" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616649" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:091">RHSA-2001:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:091">RHSA-2001:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:091">RHSA-2001:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:091">RHSA-2001:091</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1174
https://nvd.nist.gov/vuln/detail/CVE-2001-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1175">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2001-07-12T00:00:00</PublicDate>
    <Bugzilla id="1616650" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616650" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:095">RHSA-2001:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:132">RHSA-2001:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:132">RHSA-2001:132</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1175
https://nvd.nist.gov/vuln/detail/CVE-2001-1175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1227">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2001-10-10T00:00:00</PublicDate>
    <Bugzilla id="1616651" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616651" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:072">RHSA-2001:072</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2001-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:115">RHSA-2001:115</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:115">RHSA-2001:115</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:115">RHSA-2001:115</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1227
https://nvd.nist.gov/vuln/detail/CVE-2001-1227
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1229">
    <PublicDate>2001-03-13T00:00:00</PublicDate>
    <Bugzilla id="1616652" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616652" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in (1) Icecast before 1.3.9 and (2) libshout before 1.0.4 allow remote attackers to cause a denial of service (crash) and execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1229
https://nvd.nist.gov/vuln/detail/CVE-2001-1229
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1230">
    <PublicDate>2001-03-13T00:00:00</PublicDate>
    <Bugzilla id="1616653" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616653" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Icecast before 1.3.10 allow remote attackers to cause a denial of service (crash) and execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1230
https://nvd.nist.gov/vuln/detail/CVE-2001-1230
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1246">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-06-30T00:00:00</PublicDate>
    <Bugzilla id="1616654" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616654" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:129">RHSA-2002:129</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:102">RHSA-2002:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:102">RHSA-2002:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:159">RHSA-2003:159</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:102">RHSA-2002:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:102">RHSA-2002:102</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1246
https://nvd.nist.gov/vuln/detail/CVE-2001-1246
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1247">
    <PublicDate>2001-06-30T00:00:00</PublicDate>
    <Bugzilla id="1616655" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616655" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1247
https://nvd.nist.gov/vuln/detail/CVE-2001-1247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1267">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-07-12T00:00:00</PublicDate>
    <Bugzilla id="1616656" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616656" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:138">RHSA-2002:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1267
https://nvd.nist.gov/vuln/detail/CVE-2001-1267
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1268">
    <PublicDate>2001-07-05T00:00:00</PublicDate>
    <Bugzilla id="1616657" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616657" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) in an extracted filename.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:138">RHSA-2002:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1268
https://nvd.nist.gov/vuln/detail/CVE-2001-1268
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1269">
    <PublicDate>2001-07-05T00:00:00</PublicDate>
    <Bugzilla id="1616658" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616658" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Info-ZIP UnZip 5.42 and earlier allows attackers to overwrite arbitrary files during archive extraction via filenames in the archive that begin with the '/' (slash) character.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:138">RHSA-2002:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1269
https://nvd.nist.gov/vuln/detail/CVE-2001-1269
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1273">
    <PublicDate>2001-02-08T00:00:00</PublicDate>
    <Bugzilla id="1616659" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616659" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;mxcsr P4&quot; vulnerability in the Linux kernel before 2.2.17-14, when running on certain Intel CPUs, allows local users to cause a denial of service (system halt).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:013">RHSA-2001:013</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1273
https://nvd.nist.gov/vuln/detail/CVE-2001-1273
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1274">
    <PublicDate>2001-01-19T00:00:00</PublicDate>
    <Bugzilla id="1616660" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616660" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:003">RHSA-2001:003</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1274
https://nvd.nist.gov/vuln/detail/CVE-2001-1274
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1275">
    <PublicDate>2001-01-23T00:00:00</PublicDate>
    <Bugzilla id="1616661" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616661" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:003">RHSA-2001:003</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1275
https://nvd.nist.gov/vuln/detail/CVE-2001-1275
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1276">
    <PublicDate>2001-06-04T00:00:00</PublicDate>
    <Bugzilla id="1616662" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616662" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:074">RHSA-2001:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:074">RHSA-2001:074</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1276
https://nvd.nist.gov/vuln/detail/CVE-2001-1276
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1277">
    <PublicDate>2001-06-11T00:00:00</PublicDate>
    <Bugzilla id="1616663" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616663" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
makewhatis in the man package before 1.5i2 allows an attacker in group man to overwrite arbitrary files via a man page whose name contains shell metacharacters.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1277
https://nvd.nist.gov/vuln/detail/CVE-2001-1277
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1278">
    <PublicDate>2001-10-10T00:00:00</PublicDate>
    <Bugzilla id="1616664" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616664" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1278
https://nvd.nist.gov/vuln/detail/CVE-2001-1278
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1279">
    <PublicDate>2001-07-09T00:00:00</PublicDate>
    <Bugzilla id="1616665" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616665" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:089">RHSA-2001:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:089">RHSA-2001:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:089">RHSA-2001:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:089">RHSA-2001:089</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1279
https://nvd.nist.gov/vuln/detail/CVE-2001-1279
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1322">
    <PublicDate>2001-06-11T00:00:00</PublicDate>
    <Bugzilla id="1616666" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616666" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:075">RHSA-2001:075</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:075">RHSA-2001:075</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1322
https://nvd.nist.gov/vuln/detail/CVE-2001-1322
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1323">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2001-04-25T00:00:00</PublicDate>
    <Bugzilla id="1616667" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616667" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:060">RHSA-2001:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:060">RHSA-2001:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:060">RHSA-2001:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1323
https://nvd.nist.gov/vuln/detail/CVE-2001-1323
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1332">
    <PublicDate>2001-03-05T00:00:00</PublicDate>
    <Bugzilla id="1616668" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616668" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:032">RHSA-2002:032</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1332
https://nvd.nist.gov/vuln/detail/CVE-2001-1332
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1333">
    <PublicDate>2001-03-05T00:00:00</PublicDate>
    <Bugzilla id="1616669" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616669" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:032">RHSA-2002:032</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1333
https://nvd.nist.gov/vuln/detail/CVE-2001-1333
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1349">
    <PublicDate>2001-05-28T00:00:00</PublicDate>
    <Bugzilla id="1616670" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616670" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:106">RHSA-2001:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1349
https://nvd.nist.gov/vuln/detail/CVE-2001-1349
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1350">
    <PublicDate>2001-12-25T00:00:00</PublicDate>
    <Bugzilla id="1616671" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616671" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in namazu.cgi for Namazu 2.0.7 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the lang parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2002-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:162">RHSA-2001:162</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1350
https://nvd.nist.gov/vuln/detail/CVE-2001-1350
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1351">
    <PublicDate>2001-12-25T00:00:00</PublicDate>
    <Bugzilla id="1616672" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616672" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2002-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:162">RHSA-2001:162</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1351
https://nvd.nist.gov/vuln/detail/CVE-2001-1351
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1352">
    <PublicDate>2001-12-27T00:00:00</PublicDate>
    <Bugzilla id="1616673" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616673" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2002-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:179">RHSA-2001:179</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1352
https://nvd.nist.gov/vuln/detail/CVE-2001-1352
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1353">
    <PublicDate>2001-09-18T00:00:00</PublicDate>
    <Bugzilla id="1616674" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616674" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:138">RHSA-2001:138</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1353
https://nvd.nist.gov/vuln/detail/CVE-2001-1353
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1374">
    <PublicDate>2001-02-18T00:00:00</PublicDate>
    <Bugzilla id="1616675" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616675" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:148">RHSA-2002:148</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:148">RHSA-2002:148</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1374
https://nvd.nist.gov/vuln/detail/CVE-2001-1374
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1375">
    <PublicDate>2001-02-18T00:00:00</PublicDate>
    <Bugzilla id="1616676" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616676" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:148">RHSA-2002:148</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:148">RHSA-2002:148</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1375
https://nvd.nist.gov/vuln/detail/CVE-2001-1375
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1376">
    <PublicDate>2001-11-13T00:00:00</PublicDate>
    <Bugzilla id="1616677" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616677" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in digest calculation function of multiple RADIUS implementations allows remote attackers to cause a denial of service and possibly execute arbitrary code via shared secret data.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:030">RHSA-2002:030</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:030">RHSA-2002:030</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1376
https://nvd.nist.gov/vuln/detail/CVE-2001-1376
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1377">
    <PublicDate>2001-11-13T00:00:00</PublicDate>
    <Bugzilla id="1616678" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616678" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:030">RHSA-2002:030</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:030">RHSA-2002:030</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1377
https://nvd.nist.gov/vuln/detail/CVE-2001-1377
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1378">
    <PublicDate>2001-03-12T00:00:00</PublicDate>
    <Bugzilla id="1616679" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616679" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:103">RHSA-2001:103</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1378
https://nvd.nist.gov/vuln/detail/CVE-2001-1378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1379">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616680" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616680" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:124">RHSA-2001:124</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1379
https://nvd.nist.gov/vuln/detail/CVE-2001-1379
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1380">
    <PublicDate>2001-09-26T00:00:00</PublicDate>
    <Bugzilla id="1616681" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616681" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the &quot;from&quot; option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:114">RHSA-2001:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:114">RHSA-2001:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:114">RHSA-2001:114</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1380
https://nvd.nist.gov/vuln/detail/CVE-2001-1380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1383">
    <PublicDate>2001-09-19T00:00:00</PublicDate>
    <Bugzilla id="1616682" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616682" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:110">RHSA-2001:110</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:110">RHSA-2001:110</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1383
https://nvd.nist.gov/vuln/detail/CVE-2001-1383
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1384">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-10-18T00:00:00</PublicDate>
    <Bugzilla id="1616683" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616683" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:130">RHSA-2001:130</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:130">RHSA-2001:130</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:129">RHSA-2001:129</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:129">RHSA-2001:129</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1384
https://nvd.nist.gov/vuln/detail/CVE-2001-1384
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1385">
    <PublicDate>2001-01-12T00:00:00</PublicDate>
    <Bugzilla id="1616684" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616684" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:5.2">
        <ProductName>Red Hat Linux 5.2</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2000-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2000:136">RHSA-2000:136</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1385
https://nvd.nist.gov/vuln/detail/CVE-2001-1385
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1387">
    <PublicDate>2001-10-30T00:00:00</PublicDate>
    <Bugzilla id="1616685" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616685" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
iptables-save in iptables before 1.2.4 records the &quot;--reject-with icmp-host-prohibited&quot; rule as &quot;--reject-with tcp-reset,&quot; which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:144">RHSA-2001:144</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:144">RHSA-2001:144</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1387
https://nvd.nist.gov/vuln/detail/CVE-2001-1387
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1388">
    <PublicDate>2001-10-30T00:00:00</PublicDate>
    <Bugzilla id="1616686" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616686" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:144">RHSA-2001:144</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2001-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:144">RHSA-2001:144</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1388
https://nvd.nist.gov/vuln/detail/CVE-2001-1388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1389">
    <PublicDate>2001-08-30T00:00:00</PublicDate>
    <Bugzilla id="1616687" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616687" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:109">RHSA-2001:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:109">RHSA-2001:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1389
https://nvd.nist.gov/vuln/detail/CVE-2001-1389
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1390">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616688" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616688" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1390
https://nvd.nist.gov/vuln/detail/CVE-2001-1390
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1391">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616689" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616689" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1391
https://nvd.nist.gov/vuln/detail/CVE-2001-1391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1392">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616690" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616690" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1392
https://nvd.nist.gov/vuln/detail/CVE-2001-1392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1393">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616691" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616691" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1393
https://nvd.nist.gov/vuln/detail/CVE-2001-1393
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1394">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616692" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616692" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signedness error in (1) getsockopt and (2) setsockopt for Linux kernel before 2.2.19 allows local users to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1394
https://nvd.nist.gov/vuln/detail/CVE-2001-1394
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1395">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616693" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616693" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to &quot;boundary cases,&quot; with unknown impact.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1395
https://nvd.nist.gov/vuln/detail/CVE-2001-1395
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1396">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616694" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616694" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1396
https://nvd.nist.gov/vuln/detail/CVE-2001-1396
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1397">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616695" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616695" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1397
https://nvd.nist.gov/vuln/detail/CVE-2001-1397
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1398">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616696" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616696" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Masquerading code for Linux kernel before 2.2.19 does not fully check packet lengths in certain cases, which may lead to a vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1398
https://nvd.nist.gov/vuln/detail/CVE-2001-1398
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1399">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616697" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616697" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka &quot;User access asm bug on x86.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1399
https://nvd.nist.gov/vuln/detail/CVE-2001-1399
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1400">
    <PublicDate>2001-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616698" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616698" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2001-04-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:047">RHSA-2001:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1400
https://nvd.nist.gov/vuln/detail/CVE-2001-1400
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1401">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616699" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616699" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1401
https://nvd.nist.gov/vuln/detail/CVE-2001-1401
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1402">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616700" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616700" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 does not properly escape untrusted parameters, which could allow remote attackers to conduct unauthorized activities via cross-site scripting (CSS) and possibly SQL injection attacks on (1) the product or output form variables for reports.cgi, (2) the voteon, bug_id, and user variables for showvotes.cgi, (3) an invalid email address in createaccount.cgi, (4) an invalid ID in showdependencytree.cgi, (5) invalid usernames and other fields in process_bug.cgi, and (6) error messages in buglist.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1402
https://nvd.nist.gov/vuln/detail/CVE-2001-1402
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1403">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616701" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616701" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 includes the username and password in URLs, which could allow attackers to gain privileges by reading the information from the web server logs, or by &quot;shoulder-surfing&quot; and observing the web browser's location bar.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1403
https://nvd.nist.gov/vuln/detail/CVE-2001-1403
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1404">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616702" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616702" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1404
https://nvd.nist.gov/vuln/detail/CVE-2001-1404
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1405">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616703" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616703" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1405
https://nvd.nist.gov/vuln/detail/CVE-2001-1405
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1406">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616704" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616704" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
process_bug.cgi in Bugzilla before 2.14 does not set the &quot;groupset&quot; bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1406
https://nvd.nist.gov/vuln/detail/CVE-2001-1406
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1407">
    <PublicDate>2001-08-29T00:00:00</PublicDate>
    <Bugzilla id="1616705" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616705" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2001-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:107">RHSA-2001:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1407
https://nvd.nist.gov/vuln/detail/CVE-2001-1407
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1409">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-08-28T00:00:00</PublicDate>
    <Bugzilla id="1616706" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616706" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
dexconf in XFree86 Xserver 4.1.0-2 creates the /dev/dri directory with insecure permissions (666), which allows local users to replace or create files in the root file system.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:066">RHSA-2003:066</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:067">RHSA-2003:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1409
https://nvd.nist.gov/vuln/detail/CVE-2001-1409
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1413">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2001-11-20T00:00:00</PublicDate>
    <Bugzilla id="1616707" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616707" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:536">RHSA-2004:536</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:536">RHSA-2004:536</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:536">RHSA-2004:536</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:536">RHSA-2004:536</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1413
https://nvd.nist.gov/vuln/detail/CVE-2001-1413
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1473">
    <Details source="Mitre" xml:lang="en:us">
The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker than the target's public key, which allows the attacker to compute the corresponding private key and use the target's Session ID with the compromised key pair to masquerade as the target.
    </Details>
    <Statement xml:lang="en:us">
This issue affects the version of the openssh as shipped with Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this issue as having low security impact. This issue is not currently planned to be addressed in future openssh updates for Red Hat Enterprise Linux 4. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 5 and 6, since it is SSH-1 protocol specific and those versions did not enable SSH-1 protocol support in the default configuration.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1473
https://nvd.nist.gov/vuln/detail/CVE-2001-1473
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1494">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616708" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616708" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:782">RHSA-2005:782</Advisory>
        <Package name="util-linux">util-linux-0:2.11y-31.11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:782">RHSA-2005:782</Advisory>
        <Package name="util-linux">util-linux-0:2.12a-16.EL4.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1494
https://nvd.nist.gov/vuln/detail/CVE-2001-1494
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1507">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH before 3.0.1 with Kerberos V enabled does not properly authenticate users, which could allow remote attackers to login unchallenged.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1507
https://nvd.nist.gov/vuln/detail/CVE-2001-1507
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1534">
    <Details source="Mitre" xml:lang="en:us">
mod_usertrack in Apache 1.3.11 through 1.3.20 generates session ID's using predictable information including host IP address, system time and server process ID, which allows local users to obtain session ID's and bypass authentication when these session ID's are used for authentication.
    </Details>
    <Statement xml:lang="en:us">
This is not a security issue.  The mod_usertrack cookies are not designed to be used for authentication.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1534
https://nvd.nist.gov/vuln/detail/CVE-2001-1534
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1556">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-12-31T00:00:00</PublicDate>
    <Bugzilla id="1891833" url="https://bugzilla.redhat.com/show_bug.cgi?id=1891833" xml:lang="en:us">
httpd: log files contain information directly supplied by clients and does not filter or quote control characters
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>3.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-532</CWE>
    <Details source="Mitre" xml:lang="en:us">
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
    </Details>
    <Statement xml:lang="en:us">
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd:2.4/httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:2">
        <ProductName>Red Hat JBoss Enterprise Web Server 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd22</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:3">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>httpd24-httpd</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1556
https://nvd.nist.gov/vuln/detail/CVE-2001-1556
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1572">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-27T00:00:00</PublicDate>
    <Bugzilla id="1616709" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616709" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1572
https://nvd.nist.gov/vuln/detail/CVE-2001-1572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2001-1593">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2001-01-05T00:00:00</PublicDate>
    <Bugzilla id="1060630" url="https://bugzilla.redhat.com/show_bug.cgi?id=1060630" xml:lang="en:us">
a2ps: insecure temporary file use
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.1</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>(CWE-377|CWE-367)</CWE>
    <Details source="Mitre" xml:lang="en:us">
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>a2ps</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>a2ps</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>a2ps</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2001-1593
https://nvd.nist.gov/vuln/detail/CVE-2001-1593
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0001">
    <PublicDate>2002-01-01T00:00:00</PublicDate>
    <Bugzilla id="1616710" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616710" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in RFC822 address parser in mutt before 1.2.5.1 and mutt 1.3.x before 1.3.25 allows remote attackers to execute arbitrary commands via an improperly terminated comment or phrase in the address list.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:003">RHSA-2002:003</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:003">RHSA-2002:003</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:003">RHSA-2002:003</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:003">RHSA-2002:003</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:003">RHSA-2002:003</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0001
https://nvd.nist.gov/vuln/detail/CVE-2002-0001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0002">
    <PublicDate>2001-12-18T00:00:00</PublicDate>
    <Bugzilla id="1616711" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616711" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:002">RHSA-2002:002</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0002
https://nvd.nist.gov/vuln/detail/CVE-2002-0002
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0003">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-01-14T00:00:00</PublicDate>
    <Bugzilla id="1616712" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616712" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the preprocessor in groff 1.16 and earlier allows remote attackers to gain privileges via lpd in the LPRng printing system.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:004">RHSA-2002:004</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0003
https://nvd.nist.gov/vuln/detail/CVE-2002-0003
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0004">
    <PublicDate>2002-01-17T00:00:00</PublicDate>
    <Bugzilla id="1616713" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616713" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap corruption vulnerability in the &quot;at&quot; program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:015">RHSA-2002:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:015">RHSA-2002:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:015">RHSA-2002:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:015">RHSA-2002:015</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0004
https://nvd.nist.gov/vuln/detail/CVE-2002-0004
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0006">
    <PublicDate>2002-01-09T00:00:00</PublicDate>
    <Bugzilla id="1616714" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616714" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:005">RHSA-2002:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:005">RHSA-2002:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:005">RHSA-2002:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:005">RHSA-2002:005</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0006
https://nvd.nist.gov/vuln/detail/CVE-2002-0006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0007">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616715" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616715" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CGI.pl in Bugzilla before 2.14.1, when using LDAP, allows remote attackers to obtain an anonymous bind to the LDAP server via a request that does not include a password, which causes a null password to be sent to the LDAP server.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0007
https://nvd.nist.gov/vuln/detail/CVE-2002-0007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0008">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616716" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616716" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the &quot;who&quot; parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0008
https://nvd.nist.gov/vuln/detail/CVE-2002-0008
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0009">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616717" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616717" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
show_bug.cgi in Bugzilla before 2.14.1 allows a user with &quot;Bugs Access&quot; privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0009
https://nvd.nist.gov/vuln/detail/CVE-2002-0009
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0010">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616718" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616718" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the &quot;boolean chart&quot; query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0010
https://nvd.nist.gov/vuln/detail/CVE-2002-0010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0011">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616719" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616719" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Information leak in doeditvotes.cgi in Bugzilla before 2.14.1 may allow remote attackers to more easily conduct attacks on the login.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:001">RHSA-2002:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0011
https://nvd.nist.gov/vuln/detail/CVE-2002-0011
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0012">
    <PublicDate>2002-02-12T00:00:00</PublicDate>
    <Bugzilla id="1616720" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616720" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite.  NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor.  This and other SNMP-related candidates will be updated when more accurate information is available.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0012
https://nvd.nist.gov/vuln/detail/CVE-2002-0012
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0013">
    <PublicDate>2002-02-12T00:00:00</PublicDate>
    <Bugzilla id="1616721" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616721" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite.  NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor.  This and other SNMP-related candidates will be updated when more accurate information is available.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2001:163">RHSA-2001:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0013
https://nvd.nist.gov/vuln/detail/CVE-2002-0013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0014">
    <PublicDate>2002-01-05T00:00:00</PublicDate>
    <Bugzilla id="1616722" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616722" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&amp;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:009">RHSA-2002:009</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:009">RHSA-2002:009</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:009">RHSA-2002:009</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:009">RHSA-2002:009</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0014
https://nvd.nist.gov/vuln/detail/CVE-2002-0014
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0029">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-11-12T00:00:00</PublicDate>
    <Bugzilla id="1616723" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616723" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka &quot;LIBRESOLV: buffer overrun&quot; and a different vulnerability than CVE-2002-0684.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:383">RHSA-2004:383</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:383">RHSA-2004:383</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:383">RHSA-2004:383</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:383">RHSA-2004:383</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0029
https://nvd.nist.gov/vuln/detail/CVE-2002-0029
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0036">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-01-29T00:00:00</PublicDate>
    <Bugzilla id="1616724" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616724" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in MIT Kerberos V5 ASN.1 decoder before krb5 1.2.5 allows remote attackers to cause a denial of service via a large unsigned data element length, which is later used as a negative value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0036
https://nvd.nist.gov/vuln/detail/CVE-2002-0036
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0043">
    <PublicDate>2002-01-14T00:00:00</PublicDate>
    <Bugzilla id="1616725" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616725" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:011">RHSA-2002:011</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:011">RHSA-2002:011</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:011">RHSA-2002:011</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:013">RHSA-2002:013</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0043
https://nvd.nist.gov/vuln/detail/CVE-2002-0043
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0044">
    <PublicDate>2002-01-14T00:00:00</PublicDate>
    <Bugzilla id="1616726" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616726" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.0">
        <ProductName>Red Hat Linux 6.0</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.1">
        <ProductName>Red Hat Linux 6.1</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:012">RHSA-2002:012</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0044
https://nvd.nist.gov/vuln/detail/CVE-2002-0044
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0045">
    <PublicDate>2002-01-14T00:00:00</PublicDate>
    <Bugzilla id="1616727" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616727" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a &quot;replace&quot; action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:014">RHSA-2002:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:014">RHSA-2002:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:014">RHSA-2002:014</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0045
https://nvd.nist.gov/vuln/detail/CVE-2002-0045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0046">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-01-20T00:00:00</PublicDate>
    <Bugzilla id="1616728" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616728" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel, and possibly other operating systems, allows remote attackers to read portions of memory via a series of fragmented ICMP packets that generate an ICMP TTL Exceeded response, which includes portions of the memory in the response packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:007">RHSA-2002:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:007">RHSA-2002:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0046
https://nvd.nist.gov/vuln/detail/CVE-2002-0046
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0047">
    <PublicDate>2002-01-07T00:00:00</PublicDate>
    <Bugzilla id="1616729" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616729" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CIPE VPN package before 1.3.0-3 allows remote attackers to cause a denial of service (crash) via a short malformed packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:007">RHSA-2002:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:007">RHSA-2002:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0047
https://nvd.nist.gov/vuln/detail/CVE-2002-0047
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0048">
    <PublicDate>2002-01-25T00:00:00</PublicDate>
    <Bugzilla id="1616730" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616730" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:018">RHSA-2002:018</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:018">RHSA-2002:018</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:018">RHSA-2002:018</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:018">RHSA-2002:018</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0048
https://nvd.nist.gov/vuln/detail/CVE-2002-0048
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0059">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-03-09T00:00:00</PublicDate>
    <Bugzilla id="1616731" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616731" xml:lang="en:us">
zlib: Double free in inflateEnd
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>7.0</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-416</CWE>
    <Details source="Mitre" xml:lang="en:us">
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a &quot;double free&quot;), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:027">RHSA-2002:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:027">RHSA-2002:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:027">RHSA-2002:027</Advisory>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>zlib</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>zlib</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>zlib</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>zlib</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_application_platform:6">
        <ProductName>Red Hat JBoss Enterprise Application Platform 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>zlib</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:3">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rh-nodejs12-nodejs</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:3">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rh-nodejs14-nodejs</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0059
https://nvd.nist.gov/vuln/detail/CVE-2002-0059
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0060">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-02-27T00:00:00</PublicDate>
    <Bugzilla id="1616732" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616732" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and earlier does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote attackers to bypass intended firewall restrictions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:028">RHSA-2002:028</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:028">RHSA-2002:028</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0060
https://nvd.nist.gov/vuln/detail/CVE-2002-0060
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0061">
    <Details source="Mitre" xml:lang="en:us">
Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw is specific to Apache HTTP server on Windows platforms.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0061
https://nvd.nist.gov/vuln/detail/CVE-2002-0061
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0062">
    <PublicDate>2002-02-18T00:00:00</PublicDate>
    <Bugzilla id="1616733" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616733" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to &quot;routines for moving the physical cursor and scrolling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:020">RHSA-2002:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:020">RHSA-2002:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:020">RHSA-2002:020</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0062
https://nvd.nist.gov/vuln/detail/CVE-2002-0062
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0063">
    <PublicDate>2002-02-13T00:00:00</PublicDate>
    <Bugzilla id="1616734" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616734" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:032">RHSA-2002:032</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0063
https://nvd.nist.gov/vuln/detail/CVE-2002-0063
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0067">
    <PublicDate>2002-02-21T00:00:00</PublicDate>
    <Bugzilla id="1616735" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616735" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when &quot;htcp_port 0&quot; is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0067
https://nvd.nist.gov/vuln/detail/CVE-2002-0067
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0068">
    <PublicDate>2002-02-21T00:00:00</PublicDate>
    <Bugzilla id="1616736" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616736" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0068
https://nvd.nist.gov/vuln/detail/CVE-2002-0068
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0069">
    <PublicDate>2002-02-21T00:00:00</PublicDate>
    <Bugzilla id="1616737" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616737" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:029">RHSA-2002:029</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0069
https://nvd.nist.gov/vuln/detail/CVE-2002-0069
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0080">
    <PublicDate>2002-03-11T00:00:00</PublicDate>
    <Bugzilla id="1616738" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616738" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0080
https://nvd.nist.gov/vuln/detail/CVE-2002-0080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0081">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-02-27T00:00:00</PublicDate>
    <Bugzilla id="1616739" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616739" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:035">RHSA-2002:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:040">RHSA-2002:040</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0081
https://nvd.nist.gov/vuln/detail/CVE-2002-0081
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0082">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-02-27T00:00:00</PublicDate>
    <Bugzilla id="1616740" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616740" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:041">RHSA-2002:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:041">RHSA-2002:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:041">RHSA-2002:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:042">RHSA-2002:042</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:045">RHSA-2002:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0082
https://nvd.nist.gov/vuln/detail/CVE-2002-0082
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0083">
    <PublicDate>2002-03-07T00:00:00</PublicDate>
    <Bugzilla id="1616741" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616741" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:043">RHSA-2002:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:043">RHSA-2002:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:043">RHSA-2002:043</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0083
https://nvd.nist.gov/vuln/detail/CVE-2002-0083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0092">
    <PublicDate>2002-02-20T00:00:00</PublicDate>
    <Bugzilla id="1616742" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616742" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CVS before 1.10.8 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (server crash) via the diff capability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:026">RHSA-2002:026</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0092
https://nvd.nist.gov/vuln/detail/CVE-2002-0092
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0146">
    <PublicDate>2002-05-20T00:00:00</PublicDate>
    <Bugzilla id="1616743" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616743" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fetchmail email client before 5.9.10 does not properly limit the maximum number of messages available, which allows a remote IMAP server to overwrite memory via a message count that exceeds the boundaries of an array.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:047">RHSA-2002:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:047">RHSA-2002:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:047">RHSA-2002:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:047">RHSA-2002:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:047">RHSA-2002:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0146
https://nvd.nist.gov/vuln/detail/CVE-2002-0146
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0157">
    <PublicDate>2002-05-02T00:00:00</PublicDate>
    <Bugzilla id="1616744" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616744" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Nautilus 1.0.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on the .nautilus-metafile.xml metadata file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:064">RHSA-2002:064</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0157
https://nvd.nist.gov/vuln/detail/CVE-2002-0157
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0162">
    <PublicDate>2002-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616745" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616745" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
LogWatch before 2.5 allows local users to execute arbitrary code via a symlink attack on the logwatch temporary directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:053">RHSA-2002:053</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0162
https://nvd.nist.gov/vuln/detail/CVE-2002-0162
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0163">
    <PublicDate>2002-03-26T00:00:00</PublicDate>
    <Bugzilla id="1616746" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616746" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0163
https://nvd.nist.gov/vuln/detail/CVE-2002-0163
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0164">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-05-02T00:00:00</PublicDate>
    <Bugzilla id="1616747" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616747" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in the MIT-SHM extension of the X server on Linux (XFree86) 4.2.1 and earlier allows local users to read and write arbitrary shared memory, possibly to cause a denial of service or gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:066">RHSA-2003:066</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:067">RHSA-2003:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0164
https://nvd.nist.gov/vuln/detail/CVE-2002-0164
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0165">
    <PublicDate>2002-04-03T00:00:00</PublicDate>
    <Bugzilla id="1616748" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616748" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
LogWatch 2.5 allows local users to gain root privileges via a symlink attack, a different vulnerability than CVE-2002-0162.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:053">RHSA-2002:053</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:054">RHSA-2002:054</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0165
https://nvd.nist.gov/vuln/detail/CVE-2002-0165
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0166">
    <PublicDate>2002-03-20T00:00:00</PublicDate>
    <Bugzilla id="1616749" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616749" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in analog before 5.22 allows remote attackers to execute Javascript via an HTTP request containing the script, which is entered into a web logfile and not properly filtered by analog during display.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:059">RHSA-2002:059</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0166
https://nvd.nist.gov/vuln/detail/CVE-2002-0166
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0167">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-03-20T00:00:00</PublicDate>
    <Bugzilla id="1616750" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616750" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Imlib before 1.9.13 sometimes uses the NetPBM package to load trusted images, which could allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain weaknesses of NetPBM.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0167
https://nvd.nist.gov/vuln/detail/CVE-2002-0167
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0168">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-03-20T00:00:00</PublicDate>
    <Bugzilla id="1616751" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616751" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in Imlib before 1.9.13 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by manipulating arguments that are passed to malloc, which results in a heap corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:048">RHSA-2002:048</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0168
https://nvd.nist.gov/vuln/detail/CVE-2002-0168
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0169">
    <PublicDate>2002-05-01T00:00:00</PublicDate>
    <Bugzilla id="1616752" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616752" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default stylesheet for DocBook on Red Hat Linux 6.2 through 7.2 is installed with an insecure option enabled, which could allow users to overwrite files outside of the current directory from an untrusted document by using a full pathname as an element identifier.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:062">RHSA-2002:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:062">RHSA-2002:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:062">RHSA-2002:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:062">RHSA-2002:062</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0169
https://nvd.nist.gov/vuln/detail/CVE-2002-0169
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0170">
    <PublicDate>2002-03-01T00:00:00</PublicDate>
    <Bugzilla id="1616753" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616753" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0170
https://nvd.nist.gov/vuln/detail/CVE-2002-0170
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0177">
    <PublicDate>2002-04-02T00:00:00</PublicDate>
    <Bugzilla id="1616754" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616754" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in icecast 1.3.11 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request from an MP3 client.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:063">RHSA-2002:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0177
https://nvd.nist.gov/vuln/detail/CVE-2002-0177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0178">
    <PublicDate>2002-04-12T00:00:00</PublicDate>
    <Bugzilla id="1616755" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616755" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
uudecode, as available in the sharutils package before 4.2.1, does not check whether the filename of the uudecoded file is a pipe or symbolic link, which could allow attackers to overwrite files or execute commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:180">RHSA-2003:180</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:065">RHSA-2002:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:065">RHSA-2002:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:065">RHSA-2002:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:065">RHSA-2002:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0178
https://nvd.nist.gov/vuln/detail/CVE-2002-0178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0180">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-04-15T00:00:00</PublicDate>
    <Bugzilla id="1616756" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616756" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Webalizer 2.01-06, when configured to use reverse DNS lookups, allows remote attackers to execute arbitrary code by connecting to the monitored web server from an IP address that resolves to a long hostname.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:255">RHSA-2002:255</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:254">RHSA-2002:254</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:255">RHSA-2002:255</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0180
https://nvd.nist.gov/vuln/detail/CVE-2002-0180
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0184">
    <PublicDate>2002-04-25T00:00:00</PublicDate>
    <Bugzilla id="1616757" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616757" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:071">RHSA-2002:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:071">RHSA-2002:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:071">RHSA-2002:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:072">RHSA-2002:072</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0184
https://nvd.nist.gov/vuln/detail/CVE-2002-0184
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0185">
    <PublicDate>2002-04-05T00:00:00</PublicDate>
    <Bugzilla id="1616758" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616758" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_python version 2.7.6 and earlier allows a module indirectly imported by a published module to then be accessed via the publisher, which allows remote attackers to call possibly dangerous functions from the imported module.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:070">RHSA-2002:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:070">RHSA-2002:070</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0185
https://nvd.nist.gov/vuln/detail/CVE-2002-0185
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0272">
    <PublicDate>2002-02-12T00:00:00</PublicDate>
    <Bugzilla id="1616759" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616759" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in mpg321 before 0.2.9 allows local and possibly remote attackers to execute arbitrary code via a long URL to (1) a command line option, (2) an HTTP request, or (3) an FTP request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:078">RHSA-2002:078</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0272
https://nvd.nist.gov/vuln/detail/CVE-2002-0272
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0274">
    <PublicDate>2002-02-13T00:00:00</PublicDate>
    <Bugzilla id="1616760" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616760" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Exim 3.34 and earlier may allow local users to gain privileges via a buffer overflow in long -C (configuration file) and other command line arguments.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0274
https://nvd.nist.gov/vuln/detail/CVE-2002-0274
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0353">
    <PublicDate>2002-03-23T00:00:00</PublicDate>
    <Bugzilla id="1616761" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616761" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0353
https://nvd.nist.gov/vuln/detail/CVE-2002-0353
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0354">
    <PublicDate>2002-04-25T00:00:00</PublicDate>
    <Bugzilla id="1616762" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616762" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XMLHttpRequest object (XMLHTTP) in Netscape 6.1 and Mozilla 0.9.7 allows remote attackers to read arbitrary files and list directories on a client system by opening a URL that redirects the browser to the file on the client, then reading the result using the responseText property.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:079">RHSA-2002:079</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:079">RHSA-2002:079</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0354
https://nvd.nist.gov/vuln/detail/CVE-2002-0354
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0363">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-01-31T00:00:00</PublicDate>
    <Bugzilla id="1616763" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616763" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ghostscript before 6.53 allows attackers to execute arbitrary commands by using .locksafe or .setsafe to reset the current pagedevice.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:123">RHSA-2002:123</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:083">RHSA-2002:083</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:083">RHSA-2002:083</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:083">RHSA-2002:083</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:209">RHSA-2003:209</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:083">RHSA-2002:083</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:083">RHSA-2002:083</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0363
https://nvd.nist.gov/vuln/detail/CVE-2002-0363
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0374">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-05-06T00:00:00</PublicDate>
    <Bugzilla id="1616764" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616764" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the logging function for the pam_ldap PAM LDAP module before version 144 allows attackers to execute arbitrary code via format strings in the configuration file name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:180">RHSA-2002:180</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:084">RHSA-2002:084</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:084">RHSA-2002:084</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:084">RHSA-2002:084</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:084">RHSA-2002:084</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:084">RHSA-2002:084</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:180">RHSA-2002:180</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0374
https://nvd.nist.gov/vuln/detail/CVE-2002-0374
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0378">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-06-10T00:00:00</PublicDate>
    <Bugzilla id="1616765" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616765" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default configuration of LPRng print spooler in Red Hat Linux 7.0 through 7.3, Mandrake 8.1 and 8.2, and other operating systems, accepts print jobs from arbitrary remote hosts.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:120">RHSA-2002:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:089">RHSA-2002:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:089">RHSA-2002:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:225">RHSA-2003:225</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:089">RHSA-2002:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:089">RHSA-2002:089</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0378
https://nvd.nist.gov/vuln/detail/CVE-2002-0378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0379">
    <PublicDate>2002-05-10T00:00:00</PublicDate>
    <Bugzilla id="1616766" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616766" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:092">RHSA-2002:092</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:092">RHSA-2002:092</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:092">RHSA-2002:092</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:092">RHSA-2002:092</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0379
https://nvd.nist.gov/vuln/detail/CVE-2002-0379
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0380">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-05-31T00:00:00</PublicDate>
    <Bugzilla id="1616767" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616767" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via an NFS packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:121">RHSA-2002:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:094">RHSA-2002:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:094">RHSA-2002:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:094">RHSA-2002:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:094">RHSA-2002:094</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0380
https://nvd.nist.gov/vuln/detail/CVE-2002-0380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0382">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-03-27T00:00:00</PublicDate>
    <Bugzilla id="1616768" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616768" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:124">RHSA-2002:124</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:097">RHSA-2002:097</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:097">RHSA-2002:097</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:097">RHSA-2002:097</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:097">RHSA-2002:097</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:097">RHSA-2002:097</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0382
https://nvd.nist.gov/vuln/detail/CVE-2002-0382
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0384">
    <PublicDate>2002-05-21T00:00:00</PublicDate>
    <Bugzilla id="1616769" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616769" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Jabber plug-in for Gaim client before 0.58 allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:122">RHSA-2002:122</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:098">RHSA-2002:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:156">RHSA-2003:156</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:098">RHSA-2002:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:098">RHSA-2002:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:107">RHSA-2002:107</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0384
https://nvd.nist.gov/vuln/detail/CVE-2002-0384
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0388">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-05-20T00:00:00</PublicDate>
    <Bugzilla id="1616770" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616770" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerabilities in Mailman before 2.0.11 allow remote attackers to execute script via (1) the admin login page, or (2) the Pipermail index summaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:125">RHSA-2002:125</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:099">RHSA-2002:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:099">RHSA-2002:099</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:100">RHSA-2002:100</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-06-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:100">RHSA-2002:100</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:101">RHSA-2002:101</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0388
https://nvd.nist.gov/vuln/detail/CVE-2002-0388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0389">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2008-08-19T00:00:00</PublicDate>
    <Bugzilla id="723584" url="https://bugzilla.redhat.com/show_bug.cgi?id=723584" xml:lang="en:us">
mailman: Local users able to read private mailing list archives
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.1</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Pipermail in Mailman stores private mail messages with predictable filenames in a world-executable directory, which allows local users to read private mailing list archives.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1417">RHSA-2015:1417</Advisory>
        <Package name="mailman">mailman-3:2.1.12-25.el6</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>mailman</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>mailman</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0389
https://nvd.nist.gov/vuln/detail/CVE-2002-0389
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0391">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-29T00:00:00</PublicDate>
    <Bugzilla id="1616771" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616771" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:167">RHSA-2002:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:173">RHSA-2002:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:166">RHSA-2002:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:172">RHSA-2002:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:166">RHSA-2002:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:172">RHSA-2002:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:166">RHSA-2002:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:172">RHSA-2002:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:212">RHSA-2003:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:166">RHSA-2002:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:172">RHSA-2002:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:166">RHSA-2002:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:172">RHSA-2002:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0391
https://nvd.nist.gov/vuln/detail/CVE-2002-0391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0392">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-17T00:00:00</PublicDate>
    <Bugzilla id="1616772" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616772" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:126">RHSA-2002:126</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:103">RHSA-2002:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:103">RHSA-2002:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:103">RHSA-2002:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:103">RHSA-2002:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:103">RHSA-2002:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:117">RHSA-2002:117</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:118">RHSA-2002:118</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:118">RHSA-2002:118</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:150">RHSA-2002:150</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0392
https://nvd.nist.gov/vuln/detail/CVE-2002-0392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0399">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-09-30T00:00:00</PublicDate>
    <Bugzilla id="1616773" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616773" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) &quot;/..&quot; or (2) &quot;./..&quot; string, which removes the leading slash but leaves the &quot;..&quot;, a variant of CVE-2001-1267.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:138">RHSA-2002:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0399
https://nvd.nist.gov/vuln/detail/CVE-2002-0399
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0400">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-06-04T00:00:00</PublicDate>
    <Bugzilla id="1616774" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616774" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:119">RHSA-2002:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:105">RHSA-2002:105</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:154">RHSA-2003:154</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:105">RHSA-2002:105</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:105">RHSA-2002:105</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0400
https://nvd.nist.gov/vuln/detail/CVE-2002-0400
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0401">
    <PublicDate>2002-05-19T00:00:00</PublicDate>
    <Bugzilla id="1616775" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616775" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0401
https://nvd.nist.gov/vuln/detail/CVE-2002-0401
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0402">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-05-19T00:00:00</PublicDate>
    <Bugzilla id="1616776" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616776" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0402
https://nvd.nist.gov/vuln/detail/CVE-2002-0402
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0403">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-05-19T00:00:00</PublicDate>
    <Bugzilla id="1616777" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616777" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0403
https://nvd.nist.gov/vuln/detail/CVE-2002-0403
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0404">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-05-19T00:00:00</PublicDate>
    <Bugzilla id="1616778" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616778" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:088">RHSA-2002:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0404
https://nvd.nist.gov/vuln/detail/CVE-2002-0404
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0429">
    <PublicDate>2002-03-08T00:00:00</PublicDate>
    <Bugzilla id="1616779" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616779" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:158">RHSA-2002:158</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0429
https://nvd.nist.gov/vuln/detail/CVE-2002-0429
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0435">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-03-07T00:00:00</PublicDate>
    <Bugzilla id="1616780" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616780" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a &quot;..&quot; directory that is higher than expected, possibly up to the root file system.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:016">RHSA-2003:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:015">RHSA-2003:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:015">RHSA-2003:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:015">RHSA-2003:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:015">RHSA-2003:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:015">RHSA-2003:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:016">RHSA-2003:016</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0435
https://nvd.nist.gov/vuln/detail/CVE-2002-0435
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0497">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in mtr 0.46 and earlier, when installed setuid root, allows local users to access a raw socket via a long MTR_OPTIONS environment variable.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0497
https://nvd.nist.gov/vuln/detail/CVE-2002-0497
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0510">
    <Details source="Mitre" xml:lang="en:us">
The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux.
    </Details>
    <Statement xml:lang="en:us">
Red Hat do not consider this to be a security issue and there are many ways that you can identify or fingerprint a Linux machine.  Users that wish to block fingerprinting can use various techniques to disguise their operating system, for example see
http://www.infosecwriters.com/text_resources/pdf/nmap.pdf
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0510
https://nvd.nist.gov/vuln/detail/CVE-2002-0510
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0593">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-04-30T00:00:00</PublicDate>
    <Bugzilla id="1616781" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616781" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Netscape 6 and Mozilla 1.0 RC1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long channel name in an IRC URI.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:046">RHSA-2003:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0593
https://nvd.nist.gov/vuln/detail/CVE-2002-0593
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0594">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-04-30T00:00:00</PublicDate>
    <Bugzilla id="1616782" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616782" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape 6 and Mozilla 1.0 RC1 and earlier allows remote attackers to determine the existence of files on the client system via a LINK element in a Cascading Style Sheet (CSS) page that causes an HTTP redirect.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:046">RHSA-2003:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0594
https://nvd.nist.gov/vuln/detail/CVE-2002-0594
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0638">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-07-29T00:00:00</PublicDate>
    <Bugzilla id="1616783" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616783" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:137">RHSA-2002:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:132">RHSA-2002:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:132">RHSA-2002:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:132">RHSA-2002:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:132">RHSA-2002:132</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:132">RHSA-2002:132</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0638
https://nvd.nist.gov/vuln/detail/CVE-2002-0638
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0639">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in sshd in OpenSSH 2.9.9 through 3.3 allows remote attackers to execute arbitrary code during challenge response authentication (ChallengeResponseAuthentication) when OpenSSH is using SKEY or BSD_AUTH authentication.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 3 or later.

This issue did not affect the OpenSSL packages as shipped with Red Hat Enterprise Linux 2.1 as they were not compiled with S/Key or BSD_AUTH support.  The upstream patch for this issue and CVE-2002-0640 was included in an errata so that users recompiling OpenSSL with support for those authentication methods would also be protected:
https://rhn.redhat.com/errata/RHSA-2002-131.html
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0639
https://nvd.nist.gov/vuln/detail/CVE-2002-0639
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0640">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-26T00:00:00</PublicDate>
    <Bugzilla id="1616784" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616784" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in sshd in OpenSSH 2.3.1 through 3.3 may allow remote attackers to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuthenticationViaKbdInt).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:131">RHSA-2002:131</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:127">RHSA-2002:127</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:127">RHSA-2002:127</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:127">RHSA-2002:127</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:127">RHSA-2002:127</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0640
https://nvd.nist.gov/vuln/detail/CVE-2002-0640
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0651">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-06-26T00:00:00</PublicDate>
    <Bugzilla id="1616785" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616785" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the DNS resolver code used in libc, glibc, and libbind, as derived from ISC BIND, allows remote malicious DNS servers to cause a denial of service and possibly execute arbitrary code via the stub resolvers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:119">RHSA-2002:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:167">RHSA-2002:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:133">RHSA-2002:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:133">RHSA-2002:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:133">RHSA-2002:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:154">RHSA-2003:154</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:133">RHSA-2002:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:133">RHSA-2002:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0651
https://nvd.nist.gov/vuln/detail/CVE-2002-0651
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0653">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-24T00:00:00</PublicDate>
    <Bugzilla id="1616786" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616786" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:136">RHSA-2002:136</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:134">RHSA-2002:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:134">RHSA-2002:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:134">RHSA-2002:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:134">RHSA-2002:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:135">RHSA-2002:135</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:164">RHSA-2002:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-08-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:146">RHSA-2002:146</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0653
https://nvd.nist.gov/vuln/detail/CVE-2002-0653
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0655">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-07-30T00:00:00</PublicDate>
    <Bugzilla id="1616787" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616787" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:157">RHSA-2002:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:164">RHSA-2002:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:163">RHSA-2002:163</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0655
https://nvd.nist.gov/vuln/detail/CVE-2002-0655
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0656">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-07-30T00:00:00</PublicDate>
    <Bugzilla id="1616788" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616788" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:157">RHSA-2002:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:155">RHSA-2002:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:164">RHSA-2002:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:163">RHSA-2002:163</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0656
https://nvd.nist.gov/vuln/detail/CVE-2002-0656
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0657">
    <PublicDate>2002-07-30T00:00:00</PublicDate>
    <Bugzilla id="1616789" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616789" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos enabled, allows attackers to execute arbitrary code via a long master key.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0657
https://nvd.nist.gov/vuln/detail/CVE-2002-0657
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0658">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-07-29T00:00:00</PublicDate>
    <Bugzilla id="1616790" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616790" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OSSP mm library (libmm) before 1.2.0 allows the local Apache user to gain privileges via temporary files, possibly via a symbolic link attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:154">RHSA-2002:154</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:153">RHSA-2002:153</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:153">RHSA-2002:153</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:158">RHSA-2003:158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:153">RHSA-2002:153</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:153">RHSA-2002:153</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:156">RHSA-2002:156</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:164">RHSA-2002:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:163">RHSA-2002:163</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0658
https://nvd.nist.gov/vuln/detail/CVE-2002-0658
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0659">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-30T00:00:00</PublicDate>
    <Bugzilla id="1616792" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616792" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ASN1 library in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allows remote attackers to cause a denial of service via invalid encodings.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:161">RHSA-2002:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:160">RHSA-2002:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:160">RHSA-2002:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:160">RHSA-2002:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:160">RHSA-2002:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:160">RHSA-2002:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:161">RHSA-2002:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:164">RHSA-2002:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:184">RHSA-2002:184</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:163">RHSA-2002:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-09-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:193">RHSA-2002:193</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0659
https://nvd.nist.gov/vuln/detail/CVE-2002-0659
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0660">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-05T00:00:00</PublicDate>
    <Bugzilla id="1616793" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616793" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in libpng 1.0.12-3.woody.2 and libpng3 1.2.1-1.1.woody.2 on Debian GNU/Linux 3.0, and other operating systems, may allow attackers to cause a denial of service and possibly execute arbitrary code, a different vulnerability than CVE-2002-0728.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:152">RHSA-2002:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:157">RHSA-2003:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0660
https://nvd.nist.gov/vuln/detail/CVE-2002-0660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0662">
    <PublicDate>2002-09-03T00:00:00</PublicDate>
    <Bugzilla id="1616794" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616794" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
scrollkeeper-get-cl in ScrollKeeper 0.3 to 0.3.11 allows local users to create and overwrite files via a symlink attack on the scrollkeeper-tempfile.x temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:186">RHSA-2002:186</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0662
https://nvd.nist.gov/vuln/detail/CVE-2002-0662
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0684">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-26T00:00:00</PublicDate>
    <Bugzilla id="1616795" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616795" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:167">RHSA-2002:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:212">RHSA-2003:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:139">RHSA-2002:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0684
https://nvd.nist.gov/vuln/detail/CVE-2002-0684
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0687">
    <PublicDate>2002-04-15T00:00:00</PublicDate>
    <Bugzilla id="1616796" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616796" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;through the web code&quot; capability for Zope 2.0 through 2.5.1 b1 allows untrusted users to shut down the Zope server via certain headers.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0687
https://nvd.nist.gov/vuln/detail/CVE-2002-0687
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0688">
    <PublicDate>2002-06-14T00:00:00</PublicDate>
    <Bugzilla id="1616797" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616797" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ZCatalog plug-in index support capability for Zope 2.4.0 through 2.5.1 allows anonymous users and untrusted code to bypass access restrictions and call arbitrary methods of catalog indexes.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:060">RHSA-2002:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0688
https://nvd.nist.gov/vuln/detail/CVE-2002-0688
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0703">
    <PublicDate>2002-05-10T00:00:00</PublicDate>
    <Bugzilla id="1616798" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616798" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
An interaction between the Perl MD5 module (perl-Digest-MD5) and Perl could produce incorrect MD5 checksums for UTF-8 data, which could prevent a system from properly verifying the integrity of the data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:081">RHSA-2002:081</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0703
https://nvd.nist.gov/vuln/detail/CVE-2002-0703
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0704">
    <PublicDate>2002-05-09T00:00:00</PublicDate>
    <Bugzilla id="1616799" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616799" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Network Address Translation (NAT) capability for Netfilter (&quot;iptables&quot;) 1.2.6a and earlier leaks translated IP addresses in ICMP error messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:086">RHSA-2002:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:086">RHSA-2002:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:086">RHSA-2002:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:086">RHSA-2002:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:086">RHSA-2002:086</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0704
https://nvd.nist.gov/vuln/detail/CVE-2002-0704
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0713">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616800" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616800" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:130">RHSA-2002:130</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0713
https://nvd.nist.gov/vuln/detail/CVE-2002-0713
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0714">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616801" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616801" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:130">RHSA-2002:130</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0714
https://nvd.nist.gov/vuln/detail/CVE-2002-0714
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0715">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-03T00:00:00</PublicDate>
    <Bugzilla id="1616802" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616802" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:130">RHSA-2002:130</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-07-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:051">RHSA-2002:051</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0715
https://nvd.nist.gov/vuln/detail/CVE-2002-0715
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0728">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-07-08T00:00:00</PublicDate>
    <Bugzilla id="1616803" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616803" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the progressive reader for libpng 1.2.x before 1.2.4, and 1.0.x before 1.0.14, allows attackers to cause a denial of service (crash) via a PNG data stream that has more IDAT data than indicated by the IHDR chunk.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:152">RHSA-2002:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:157">RHSA-2003:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:151">RHSA-2002:151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0728
https://nvd.nist.gov/vuln/detail/CVE-2002-0728
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0802">
    <PublicDate>2002-05-02T00:00:00</PublicDate>
    <Bugzilla id="1616804" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616804" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The multibyte support in PostgreSQL 6.5.x with SQL_ASCII encoding consumes an extra character when processing a character that cannot be converted, which could remove an escape character from the query and make the application subject to SQL injection attacks.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:database:7.1">
        <ProductName>Red Hat Database 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:149">RHSA-2002:149</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0802
https://nvd.nist.gov/vuln/detail/CVE-2002-0802
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0803">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616805" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616805" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows remote attackers to display restricted products and components via a direct HTTP request to queryhelp.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0803
https://nvd.nist.gov/vuln/detail/CVE-2002-0803
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0804">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616806" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616806" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when configured to perform reverse DNS lookups, allows remote attackers to bypass IP restrictions by connecting from a system with a spoofed reverse DNS hostname.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0804
https://nvd.nist.gov/vuln/detail/CVE-2002-0804
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0805">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616807" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616807" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, (1) creates new directories with world-writable permissions, and (2) creates the params file with world-writable permissions, which allows local users to modify the files and execute code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0805
https://nvd.nist.gov/vuln/detail/CVE-2002-0805
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0806">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616808" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616808" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, allows authenticated users with editing privileges to delete other users by directly calling the editusers.cgi script with the &quot;del&quot; option.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0806
https://nvd.nist.gov/vuln/detail/CVE-2002-0806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0807">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616809" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616809" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerabilities in Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, could allow remote attackers to execute script as other Bugzilla users via the full name (real name) field, which is not properly quoted by editusers.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0807
https://nvd.nist.gov/vuln/detail/CVE-2002-0807
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0808">
    <PublicDate>2001-11-05T00:00:00</PublicDate>
    <Bugzilla id="1616810" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616810" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when performing a mass change, sets the groupset of all bugs to the groupset of the first bug, which could inadvertently cause insecure groupset permissions to be assigned to some bugs.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0808
https://nvd.nist.gov/vuln/detail/CVE-2002-0808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0809">
    <PublicDate>2002-06-02T00:00:00</PublicDate>
    <Bugzilla id="1616811" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616811" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, does not properly handle URL-encoded field names that are generated by some browsers, which could cause certain fields to appear to be unset, which has the effect of removing group permissions on bugs when buglist.cgi is provided with the encoded field names.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0809
https://nvd.nist.gov/vuln/detail/CVE-2002-0809
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0810">
    <PublicDate>2001-07-25T00:00:00</PublicDate>
    <Bugzilla id="1616812" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616812" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, directs error messages from the syncshadowdb command to the HTML output, which could leak sensitive information, including plaintext passwords, if syncshadowdb fails.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0810
https://nvd.nist.gov/vuln/detail/CVE-2002-0810
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0811">
    <PublicDate>2002-06-08T00:00:00</PublicDate>
    <Bugzilla id="1616813" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616813" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, may allow remote attackers to cause a denial of service or execute certain queries via a SQL injection attack on the sort order parameter to buglist.cgi.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:109">RHSA-2002:109</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0811
https://nvd.nist.gov/vuln/detail/CVE-2002-0811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0821">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-28T00:00:00</PublicDate>
    <Bugzilla id="1616814" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616814" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Ethereal 0.9.4 and earlier allow remote attackers to cause a denial of service or execute arbitrary code via (1) the BGP dissector, or (2) the WCP dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0821
https://nvd.nist.gov/vuln/detail/CVE-2002-0821
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0822">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-28T00:00:00</PublicDate>
    <Bugzilla id="1616815" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616815" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0822
https://nvd.nist.gov/vuln/detail/CVE-2002-0822
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0825">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-23T00:00:00</PublicDate>
    <Bugzilla id="1616816" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616816" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the DNS SRV code for nss_ldap before nss_ldap-198 allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:180">RHSA-2002:180</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:175">RHSA-2002:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:180">RHSA-2002:180</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0825
https://nvd.nist.gov/vuln/detail/CVE-2002-0825
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0834">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-20T00:00:00</PublicDate>
    <Bugzilla id="1616817" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616817" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ISIS dissector for Ethereal 0.9.5 and earlier allows remote attackers to cause a denial of service or execute arbitrary code via malformed packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:170">RHSA-2002:170</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:169">RHSA-2002:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:6.2">
        <ProductName>Red Hat Powertools 6.2</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:036">RHSA-2002:036</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0834
https://nvd.nist.gov/vuln/detail/CVE-2002-0834
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0835">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-30T00:00:00</PublicDate>
    <Bugzilla id="1616818" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616818" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Preboot eXecution Environment (PXE) server allows remote attackers to cause a denial of service (crash) via certain DHCP packets from Voice-Over-IP (VOIP) phones.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:165">RHSA-2002:165</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:162">RHSA-2002:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:162">RHSA-2002:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:162">RHSA-2002:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:162">RHSA-2002:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:162">RHSA-2002:162</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0835
https://nvd.nist.gov/vuln/detail/CVE-2002-0835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0836">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-10-14T00:00:00</PublicDate>
    <Bugzilla id="1616819" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616819" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:195">RHSA-2002:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:194">RHSA-2002:194</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0836
https://nvd.nist.gov/vuln/detail/CVE-2002-0836
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0837">
    <PublicDate>2002-09-09T00:00:00</PublicDate>
    <Bugzilla id="1616820" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616820" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
wordtrans 1.1pre8 and earlier in the wordtrans-web package allows remote attackers to (1) execute arbitrary code or (2) conduct cross-site scripting attacks via certain parameters (possibly &quot;dict&quot;) to the wordtrans.php script.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:188">RHSA-2002:188</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0837
https://nvd.nist.gov/vuln/detail/CVE-2002-0837
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0838">
    <PublicDate>2002-09-26T00:00:00</PublicDate>
    <Bugzilla id="1616821" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616821" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in (1) gv 3.5.8 and earlier, (2) gvv 1.0.2 and earlier, (3) ggv 1.99.90 and earlier, (4) gnome-gv, and (5) kghostview in kdegraphics 2.2.2 and earlier, allows attackers to execute arbitrary code via a malformed (a) PDF or (b) PostScript file, which is processed by an unsafe call to sscanf.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:211">RHSA-2002:211</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:207">RHSA-2002:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:211">RHSA-2002:211</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:212">RHSA-2002:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:212">RHSA-2002:212</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0838
https://nvd.nist.gov/vuln/detail/CVE-2002-0838
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0839">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-10-03T00:00:00</PublicDate>
    <Bugzilla id="1616822" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616822" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0839
https://nvd.nist.gov/vuln/detail/CVE-2002-0839
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0840">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-10-02T00:00:00</PublicDate>
    <Bugzilla id="1616823" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616823" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is &quot;Off&quot; and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0840
https://nvd.nist.gov/vuln/detail/CVE-2002-0840
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0843">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-10-03T00:00:00</PublicDate>
    <Bugzilla id="1616824" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616824" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in the ApacheBench benchmark support program (ab.c) in Apache before 1.3.27, and Apache 2.x before 2.0.43, allow a malicious web server to cause a denial of service and possibly execute arbitrary code via a long response.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0843
https://nvd.nist.gov/vuln/detail/CVE-2002-0843
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0844">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-05-25T00:00:00</PublicDate>
    <Bugzilla id="1616825" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616825" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one overflow in the CVS PreservePermissions of rcs.c for CVSD before 1.11.2 allows local users to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:004">RHSA-2004:004</Advisory>
        <Package name="cvs">cvs-0:1.11.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0844
https://nvd.nist.gov/vuln/detail/CVE-2002-0844
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0846">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-08T00:00:00</PublicDate>
    <Bugzilla id="1616826" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616826" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The decoder for Macromedia Shockwave Flash allows remote attackers to execute arbitrary code via a malformed SWF header that contains more data than the specified length.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0846
https://nvd.nist.gov/vuln/detail/CVE-2002-0846
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0855">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-07-11T00:00:00</PublicDate>
    <Bugzilla id="1616827" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616827" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in Mailman before 2.0.12 allows remote attackers to execute script as other users via a subscriber's list subscription options in the (1) adminpw or (2) info parameters to the ml-name feature.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:181">RHSA-2002:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:176">RHSA-2002:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:176">RHSA-2002:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:177">RHSA-2002:177</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:177">RHSA-2002:177</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:secure_web_server:3.2">
        <ProductName>Red Hat Secure Web Server 3.2</ProductName>
        <ReleaseDate>2002-08-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:178">RHSA-2002:178</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0855
https://nvd.nist.gov/vuln/detail/CVE-2002-0855
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0871">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-13T00:00:00</PublicDate>
    <Bugzilla id="1616828" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616828" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xinetd 2.3.4 leaks file descriptors for the signal pipe to services that are launched by xinetd, which could allow those services to cause a denial of service via the pipe.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:196">RHSA-2002:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:196">RHSA-2002:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:228">RHSA-2003:228</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:196">RHSA-2002:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:196">RHSA-2002:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:196">RHSA-2002:196</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0871
https://nvd.nist.gov/vuln/detail/CVE-2002-0871
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0875">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-01-03T00:00:00</PublicDate>
    <Bugzilla id="1616830" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616830" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in FAM 2.6.8, 2.6.6, and other versions allows unprivileged users to obtain the names of files whose access is restricted to the root group.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:005">RHSA-2005:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:005">RHSA-2005:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:005">RHSA-2005:005</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:005">RHSA-2005:005</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0875
https://nvd.nist.gov/vuln/detail/CVE-2002-0875
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0970">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-12T00:00:00</PublicDate>
    <Bugzilla id="1616831" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616831" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSL capability for Konqueror in KDE 3.0.2 and earlier does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:221">RHSA-2002:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0970
https://nvd.nist.gov/vuln/detail/CVE-2002-0970
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0972">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-20T00:00:00</PublicDate>
    <Bugzilla id="1616832" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616832" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in PostgreSQL 7.2 allow attackers to cause a denial of service and possibly execute arbitrary code via long arguments to the functions (1) lpad or (2) rpad.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0972
https://nvd.nist.gov/vuln/detail/CVE-2002-0972
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0985">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-08-23T00:00:00</PublicDate>
    <Bugzilla id="1616833" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616833" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in the mail function for PHP 4.x to 4.2.2 may allow attackers to bypass safe mode restrictions and modify command line arguments to the MTA (e.g. sendmail) in the 5th argument to mail(), altering MTA behavior and possibly executing commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:214">RHSA-2002:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:159">RHSA-2003:159</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:214">RHSA-2002:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0985
https://nvd.nist.gov/vuln/detail/CVE-2002-0985
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0986">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-23T00:00:00</PublicDate>
    <Bugzilla id="1616834" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616834" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a &quot;spam proxy.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:214">RHSA-2002:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:159">RHSA-2003:159</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:213">RHSA-2002:213</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-11-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:214">RHSA-2002:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0986
https://nvd.nist.gov/vuln/detail/CVE-2002-0986
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-0989">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-25T00:00:00</PublicDate>
    <Bugzilla id="1616835" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616835" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The URL handler in the manual browser option for Gaim before 0.59.1 allows remote attackers to execute arbitrary script via shell metacharacters in a link.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:191">RHSA-2002:191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:189">RHSA-2002:189</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:156">RHSA-2003:156</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:189">RHSA-2002:189</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:189">RHSA-2002:189</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.0">
        <ProductName>Red Hat Powertools 7.0</ProductName>
        <ReleaseDate>2002-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:190">RHSA-2002:190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-0989
https://nvd.nist.gov/vuln/detail/CVE-2002-0989
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1090">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-03-04T00:00:00</PublicDate>
    <Bugzilla id="1616836" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616836" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in read_smtp_response of protocol.c in libesmtp before 0.8.11 allows a remote SMTP server to (1) execute arbitrary code via a certain response or (2) cause a denial of service via long server responses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1090
https://nvd.nist.gov/vuln/detail/CVE-2002-1090
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1091">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-09-06T00:00:00</PublicDate>
    <Bugzilla id="1616837" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616837" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netscape 6.2.3 and earlier, and Mozilla 1.0.1, allow remote attackers to corrupt heap memory and execute arbitrary code via a GIF image with a zero width.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:046">RHSA-2003:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1091
https://nvd.nist.gov/vuln/detail/CVE-2002-1091
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1119">
    <PublicDate>2002-08-01T00:00:00</PublicDate>
    <Bugzilla id="1616838" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616838" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:048">RHSA-2003:048</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:202">RHSA-2002:202</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:202">RHSA-2002:202</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:202">RHSA-2002:202</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:202">RHSA-2002:202</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:202">RHSA-2002:202</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:048">RHSA-2003:048</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1119
https://nvd.nist.gov/vuln/detail/CVE-2002-1119
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1126">
    <PublicDate>2002-05-19T00:00:00</PublicDate>
    <Bugzilla id="1616839" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616839" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla 1.1 and earlier, and Mozilla-based browsers such as Netscape and Galeon, set the document referrer too quickly in certain situations when a new page is being loaded, which allows web pages to determine the next page that is being visited, including manually entered URLs, using the onunload handler.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:046">RHSA-2003:046</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:192">RHSA-2002:192</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1126
https://nvd.nist.gov/vuln/detail/CVE-2002-1126
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1131">
    <PublicDate>2002-09-16T00:00:00</PublicDate>
    <Bugzilla id="1616841" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616841" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:204">RHSA-2002:204</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1131
https://nvd.nist.gov/vuln/detail/CVE-2002-1131
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1132">
    <PublicDate>2002-09-16T00:00:00</PublicDate>
    <Bugzilla id="1616842" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616842" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SquirrelMail 1.2.7 and earlier allows remote attackers to determine the absolute pathname of the options.php script via a malformed optpage file argument, which generates an error message when the file cannot be included in the script.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:204">RHSA-2002:204</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1132
https://nvd.nist.gov/vuln/detail/CVE-2002-1132
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1146">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-10-03T00:00:00</PublicDate>
    <Bugzilla id="1616843" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616843" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary (&quot;read buffer overflow&quot;), allowing remote attackers to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:022">RHSA-2003:022</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:197">RHSA-2002:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:197">RHSA-2002:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:197">RHSA-2002:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:212">RHSA-2003:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:197">RHSA-2002:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:197">RHSA-2002:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:022">RHSA-2003:022</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1146
https://nvd.nist.gov/vuln/detail/CVE-2002-1146
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1148">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-09-24T00:00:00</PublicDate>
    <Bugzilla id="1616844" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616844" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default servlet (org.apache.catalina.servlets.DefaultServlet) in Tomcat 4.0.4 and 4.1.10 and earlier allows remote attackers to read source code for server files via a direct request to the servlet.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:217">RHSA-2002:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:218">RHSA-2002:218</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1148
https://nvd.nist.gov/vuln/detail/CVE-2002-1148
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1151">
    <PublicDate>2002-09-06T00:00:00</PublicDate>
    <Bugzilla id="1616845" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616845" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The cross-site scripting protection for Konqueror in KDE 2.2.2 and 3.0 through 3.0.3 does not properly initialize the domains on sub-frames and sub-iframes, which can allow remote attackers to execute script and steal cookies from subframes that are in other domains.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:221">RHSA-2002:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1151
https://nvd.nist.gov/vuln/detail/CVE-2002-1151
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1152">
    <PublicDate>2002-09-10T00:00:00</PublicDate>
    <Bugzilla id="1616846" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616846" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror in KDE 3.0 through 3.0.2 does not properly detect the &quot;secure&quot; flag in an HTTP cookie, which could cause Konqueror to send the cookie across an unencrypted channel, which could allow remote attackers to steal the cookie via sniffing.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1152
https://nvd.nist.gov/vuln/detail/CVE-2002-1152
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1154">
    <PublicDate>2002-05-14T00:00:00</PublicDate>
    <Bugzilla id="1616847" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616847" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
anlgform.pl in Analog before 5.23 does not restrict access to the PROGRESSFREQ progress update command, which allows remote attackers to cause a denial of service (disk consumption) by using the command to report updates more frequently and fill the web server error log.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:powertools:7.1">
        <ProductName>Red Hat Powertools 7.1</ProductName>
        <ReleaseDate>2002-10-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:059">RHSA-2002:059</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1154
https://nvd.nist.gov/vuln/detail/CVE-2002-1154
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1155">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-09T00:00:00</PublicDate>
    <Bugzilla id="1616848" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616848" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:050">RHSA-2003:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:050">RHSA-2003:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:050">RHSA-2003:050</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:047">RHSA-2003:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:047">RHSA-2003:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:047">RHSA-2003:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:047">RHSA-2003:047</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:047">RHSA-2003:047</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1155
https://nvd.nist.gov/vuln/detail/CVE-2002-1155
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1157">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-10-22T00:00:00</PublicDate>
    <Bugzilla id="1616849" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616849" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:106">RHSA-2003:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:222">RHSA-2002:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:251">RHSA-2002:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:243">RHSA-2002:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2002-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:244">RHSA-2002:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:248">RHSA-2002:248</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1157
https://nvd.nist.gov/vuln/detail/CVE-2002-1157
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1158">
    <PublicDate>2002-12-02T00:00:00</PublicDate>
    <Bugzilla id="1616850" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616850" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the irw_through function for Canna 3.5b2 and earlier allows local users to execute arbitrary code as the bin user.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:261">RHSA-2002:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:115">RHSA-2003:115</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:261">RHSA-2002:261</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1158
https://nvd.nist.gov/vuln/detail/CVE-2002-1158
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1159">
    <PublicDate>2002-12-02T00:00:00</PublicDate>
    <Bugzilla id="1616851" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616851" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Canna 3.6 and earlier does not properly validate requests, which allows remote attackers to cause a denial of service or information leak.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:261">RHSA-2002:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:115">RHSA-2003:115</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:246">RHSA-2002:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:261">RHSA-2002:261</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1159
https://nvd.nist.gov/vuln/detail/CVE-2002-1159
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1160">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-02-03T00:00:00</PublicDate>
    <Bugzilla id="1616852" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616852" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:028">RHSA-2003:028</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:028">RHSA-2003:028</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:028">RHSA-2003:028</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:035">RHSA-2003:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:035">RHSA-2003:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:035">RHSA-2003:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:035">RHSA-2003:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:028">RHSA-2003:028</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1160
https://nvd.nist.gov/vuln/detail/CVE-2002-1160
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1165">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-10-01T00:00:00</PublicDate>
    <Bugzilla id="1616854" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616854" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) &quot;||&quot; sequences or (2) &quot;/&quot; characters, which are not properly filtered or verified.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:259">RHSA-2002:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:227">RHSA-2003:227</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:259">RHSA-2002:259</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1165
https://nvd.nist.gov/vuln/detail/CVE-2002-1165
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1170">
    <PublicDate>2002-10-02T00:00:00</PublicDate>
    <Bugzilla id="1616855" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616855" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The handle_var_requests function in snmp_agent.c for the SNMP daemon in the Net-SNMP (formerly ucd-snmp) package 5.0.1 through 5.0.5 allows remote attackers to cause a denial of service (crash) via a NULL dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:228">RHSA-2002:228</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1170
https://nvd.nist.gov/vuln/detail/CVE-2002-1170
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1174">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-09-29T00:00:00</PublicDate>
    <Bugzilla id="1616856" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616856" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in Fetchmail 6.0.0 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) long headers that are not properly processed by the readheaders function, or (2) via long Received: headers, which are not properly parsed by the parse_received function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:216">RHSA-2002:216</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:155">RHSA-2003:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1174
https://nvd.nist.gov/vuln/detail/CVE-2002-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1175">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-09-29T00:00:00</PublicDate>
    <Bugzilla id="1616857" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616857" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The getmxrecord function in Fetchmail 6.0.0 and earlier does not properly check the boundary of a particular malformed DNS packet from a malicious DNS server, which allows remote attackers to cause a denial of service (crash) when Fetchmail attempts to read data beyond the expected boundary.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:216">RHSA-2002:216</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:155">RHSA-2003:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:215">RHSA-2002:215</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1175
https://nvd.nist.gov/vuln/detail/CVE-2002-1175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1216">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-09-28T00:00:00</PublicDate>
    <Bugzilla id="1616858" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616858" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU tar 1.13.19 and other versions before 1.13.25 allows remote attackers to overwrite arbitrary files via a symlink attack, as the result of a modification that effectively disabled the security check.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:138">RHSA-2002:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:096">RHSA-2002:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1216
https://nvd.nist.gov/vuln/detail/CVE-2002-1216
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1223">
    <PublicDate>2002-10-08T00:00:00</PublicDate>
    <Bugzilla id="1616859" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616859" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in DSC 3.0 parser from GSview, as used in KGhostView in KDE 1.1 and KDE 3.0.3a, may allow attackers to cause a denial of service or execute arbitrary code via a modified .ps (PostScript) input file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1223
https://nvd.nist.gov/vuln/detail/CVE-2002-1223
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1224">
    <PublicDate>2002-10-08T00:00:00</PublicDate>
    <Bugzilla id="1616860" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616860" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in kpf for KDE 3.0.1 through KDE 3.0.3a allows remote attackers to read arbitrary files as the kpf user via a URL with a modified icon parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1224
https://nvd.nist.gov/vuln/detail/CVE-2002-1224
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1232">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-10-21T00:00:00</PublicDate>
    <Bugzilla id="1616861" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616861" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:224">RHSA-2002:224</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:223">RHSA-2002:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:223">RHSA-2002:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:223">RHSA-2002:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:229">RHSA-2003:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:223">RHSA-2002:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:223">RHSA-2002:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:224">RHSA-2002:224</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1232
https://nvd.nist.gov/vuln/detail/CVE-2002-1232
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1235">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-10-23T00:00:00</PublicDate>
    <Bugzilla id="1616862" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616862" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:250">RHSA-2002:250</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:242">RHSA-2002:242</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1235
https://nvd.nist.gov/vuln/detail/CVE-2002-1235
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1247">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-11-11T00:00:00</PublicDate>
    <Bugzilla id="1616863" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616863" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:221">RHSA-2002:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1247
https://nvd.nist.gov/vuln/detail/CVE-2002-1247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1276">
    <PublicDate>2002-11-02T00:00:00</PublicDate>
    <Bugzilla id="1616864" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616864" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
An incomplete fix for a cross-site scripting (XSS) vulnerability in SquirrelMail 1.2.8 calls the strip_tags function on the PHP_SELF value but does not save the result back to that variable, leaving it open to cross-site scripting attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:042">RHSA-2003:042</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1276
https://nvd.nist.gov/vuln/detail/CVE-2002-1276
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1277">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-11-07T00:00:00</PublicDate>
    <Bugzilla id="1616865" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616865" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Window Maker (wmaker) 0.80.0 and earlier may allow remote attackers to execute arbitrary code via a certain image file that is not properly handled when Window Maker uses width and height information to allocate a buffer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:009">RHSA-2003:009</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:043">RHSA-2003:043</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:009">RHSA-2003:009</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1277
https://nvd.nist.gov/vuln/detail/CVE-2002-1277
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1281">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-11-11T00:00:00</PublicDate>
    <Bugzilla id="1616866" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616866" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the rlogin KIO subsystem (rlogin.protocol) of KDE 2.x 2.1 and later, and KDE 3.x 3.0.4 and earlier, allows local and remote attackers to execute arbitrary code via a certain URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1281
https://nvd.nist.gov/vuln/detail/CVE-2002-1281
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1282">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-11-11T00:00:00</PublicDate>
    <Bugzilla id="1616867" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616867" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the telnet KIO subsystem (telnet.protocol) of KDE 2.x 2.1 and later allows local and remote attackers to execute arbitrary code via a certain URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1282
https://nvd.nist.gov/vuln/detail/CVE-2002-1282
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1306">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-11-12T00:00:00</PublicDate>
    <Bugzilla id="1616869" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616869" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the &quot;lisa&quot; daemon, and (2) remote attackers to execute arbitrary code via a certain &quot;lan://&quot; URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:221">RHSA-2002:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:220">RHSA-2002:220</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1306
https://nvd.nist.gov/vuln/detail/CVE-2002-1306
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1308">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-11-14T00:00:00</PublicDate>
    <Bugzilla id="1616870" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616870" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:163">RHSA-2003:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:163">RHSA-2003:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:163">RHSA-2003:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:162">RHSA-2003:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:162">RHSA-2003:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:162">RHSA-2003:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:162">RHSA-2003:162</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:163">RHSA-2003:163</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1308
https://nvd.nist.gov/vuln/detail/CVE-2002-1308
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1318">
    <PublicDate>2002-11-20T00:00:00</PublicDate>
    <Bugzilla id="1616871" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616871" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-11-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:266">RHSA-2002:266</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-11-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:266">RHSA-2002:266</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1318
https://nvd.nist.gov/vuln/detail/CVE-2002-1318
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1319">
    <PublicDate>2002-11-11T00:00:00</PublicDate>
    <Bugzilla id="1616872" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616872" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:263">RHSA-2002:263</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:264">RHSA-2002:264</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:264">RHSA-2002:264</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:262">RHSA-2002:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:262">RHSA-2002:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:262">RHSA-2002:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:262">RHSA-2002:262</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1319
https://nvd.nist.gov/vuln/detail/CVE-2002-1319
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1320">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-11-07T00:00:00</PublicDate>
    <Bugzilla id="1616873" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616873" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Pine 4.44 and earlier allows remote attackers to cause a denial of service (core dump and failed restart) via an email message with a From header that contains a large number of quotation marks (&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:271">RHSA-2002:271</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:270">RHSA-2002:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:271">RHSA-2002:271</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1320
https://nvd.nist.gov/vuln/detail/CVE-2002-1320
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1323">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-10-04T00:00:00</PublicDate>
    <Bugzilla id="1616874" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616874" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1323
https://nvd.nist.gov/vuln/detail/CVE-2002-1323
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1335">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-11-27T00:00:00</PublicDate>
    <Bugzilla id="1616875" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616875" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in w3m 0.3.2 does not escape an HTML tag in a frame, which allows remote attackers to insert arbitrary web script or HTML and access files or cookies.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:045">RHSA-2003:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:045">RHSA-2003:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1335
https://nvd.nist.gov/vuln/detail/CVE-2002-1335
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1336">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-07-26T00:00:00</PublicDate>
    <Bugzilla id="1616876" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616876" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
TightVNC before 1.2.6 generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:287">RHSA-2002:287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1336
https://nvd.nist.gov/vuln/detail/CVE-2002-1336
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1337">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-03-03T00:00:00</PublicDate>
    <Bugzilla id="1616877" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616877" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:074">RHSA-2003:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:074">RHSA-2003:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:074">RHSA-2003:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:227">RHSA-2003:227</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:073">RHSA-2003:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:074">RHSA-2003:074</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1337
https://nvd.nist.gov/vuln/detail/CVE-2002-1337
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1341">
    <PublicDate>2002-12-03T00:00:00</PublicDate>
    <Bugzilla id="1616878" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616878" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in read_body.php for SquirrelMail 1.2.10, 1.2.9, and earlier allows remote attackers to insert script and HTML via the (1) mailbox and (2) passed_id parameters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:042">RHSA-2003:042</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1341
https://nvd.nist.gov/vuln/detail/CVE-2002-1341
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1344">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-12-10T00:00:00</PublicDate>
    <Bugzilla id="1616879" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616879" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:256">RHSA-2002:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:229">RHSA-2002:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:256">RHSA-2002:256</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1344
https://nvd.nist.gov/vuln/detail/CVE-2002-1344
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1347">
    <PublicDate>2002-12-09T00:00:00</PublicDate>
    <Bugzilla id="1616880" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616880" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:283">RHSA-2002:283</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1347
https://nvd.nist.gov/vuln/detail/CVE-2002-1347
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1348">
    <PublicDate>2002-11-27T00:00:00</PublicDate>
    <Bugzilla id="1616881" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616881" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
w3m before 0.3.2.2 does not properly escape HTML tags in the ALT attribute of an IMG tag, which could allow remote attackers to access files or cookies.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:045">RHSA-2003:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0j">
        <ProductName>Red Hat Linux 7.0j</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:044">RHSA-2003:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:045">RHSA-2003:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1348
https://nvd.nist.gov/vuln/detail/CVE-2002-1348
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1350">
    <PublicDate>2001-10-15T00:00:00</PublicDate>
    <Bugzilla id="1616882" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616882" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BGP decoding routines in tcpdump 3.6.x before 3.7 do not properly copy data, which allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:033">RHSA-2003:033</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:033">RHSA-2003:033</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1350
https://nvd.nist.gov/vuln/detail/CVE-2002-1350
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1355">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-12-07T00:00:00</PublicDate>
    <Bugzilla id="1616883" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616883" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer signedness errors in the BGP dissector in Ethereal 0.9.7 and earlier allow remote attackers to cause a denial of service (infinite loop) via malformed messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:291">RHSA-2002:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:291">RHSA-2002:291</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1355
https://nvd.nist.gov/vuln/detail/CVE-2002-1355
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1356">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-12-07T00:00:00</PublicDate>
    <Bugzilla id="1616884" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616884" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.7 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed packets to the (1) LMP, (2) PPP, or (3) TDS dissectors, possibly related to a missing field for EndVerifyAck messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:291">RHSA-2002:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:290">RHSA-2002:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:291">RHSA-2002:291</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1356
https://nvd.nist.gov/vuln/detail/CVE-2002-1356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1362">
    <PublicDate>2002-11-03T00:00:00</PublicDate>
    <Bugzilla id="1616885" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616885" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mICQ 0.4.9 and earlier allows remote attackers to cause a denial of service (crash) via malformed ICQ message types without a 0xFE separator character.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:119">RHSA-2003:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:119">RHSA-2003:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:119">RHSA-2003:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:118">RHSA-2003:118</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:118">RHSA-2003:118</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:119">RHSA-2003:119</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1362
https://nvd.nist.gov/vuln/detail/CVE-2002-1362
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1363">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616886" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616886" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Portable Network Graphics (PNG) library libpng 1.2.5 and earlier does not correctly calculate offsets, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a buffer overflow attack on the row buffers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:249">RHSA-2004:249</Advisory>
        <Package name="libpng">libpng-2:1.2.2-24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:249">RHSA-2004:249</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng">libpng-2:1.2.2-25</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:007">RHSA-2003:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:157">RHSA-2003:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:006">RHSA-2003:006</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:007">RHSA-2003:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1363
https://nvd.nist.gov/vuln/detail/CVE-2002-1363
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1365">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-12-13T00:00:00</PublicDate>
    <Bugzilla id="1616887" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616887" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Fetchmail 6.1.3 and earlier does not account for the &quot;@&quot; character when determining buffer lengths for local addresses, which allows remote attackers to execute arbitrary code via a header with a large number of local addresses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:294">RHSA-2002:294</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:155">RHSA-2003:155</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:293">RHSA-2002:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2002-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:294">RHSA-2002:294</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1365
https://nvd.nist.gov/vuln/detail/CVE-2002-1365
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1366">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616888" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616888" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1366
https://nvd.nist.gov/vuln/detail/CVE-2002-1366
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1367">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616889" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616889" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a &quot;need authorization&quot; page, as demonstrated by new-coke.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1367
https://nvd.nist.gov/vuln/detail/CVE-2002-1367
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1368">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616890" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616890" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1368
https://nvd.nist.gov/vuln/detail/CVE-2002-1368
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1369">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616891" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616891" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1369
https://nvd.nist.gov/vuln/detail/CVE-2002-1369
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1371">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616892" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616892" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1371
https://nvd.nist.gov/vuln/detail/CVE-2002-1371
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1372">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616893" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616893" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1372
https://nvd.nist.gov/vuln/detail/CVE-2002-1372
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1373">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616894" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616894" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signed integer vulnerability in the COM_TABLE_DUMP package for MySQL 3.23.x before 3.23.54 allows remote attackers to cause a denial of service (crash or hang) in mysqld by causing large negative integers to be provided to a memcpy call.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1373
https://nvd.nist.gov/vuln/detail/CVE-2002-1373
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1374">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616895" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616895" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1374
https://nvd.nist.gov/vuln/detail/CVE-2002-1374
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1375">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616896" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616896" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x to 4.0.6, allows remote attackers to execute arbitrary code via a long response.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1375
https://nvd.nist.gov/vuln/detail/CVE-2002-1375
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1376">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616897" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616897" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:288">RHSA-2002:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:289">RHSA-2002:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:104">RHSA-2003:104</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:082">RHSA-2003:082</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1376
https://nvd.nist.gov/vuln/detail/CVE-2002-1376
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1377">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616898" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616898" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:302">RHSA-2002:302</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:297">RHSA-2002:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:302">RHSA-2002:302</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1377
https://nvd.nist.gov/vuln/detail/CVE-2002-1377
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1378">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-12-06T00:00:00</PublicDate>
    <Bugzilla id="1616899" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616899" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:208">RHSA-2003:208</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1378
https://nvd.nist.gov/vuln/detail/CVE-2002-1378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1379">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2002-12-06T00:00:00</PublicDate>
    <Bugzilla id="1616900" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616900" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:208">RHSA-2003:208</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1379
https://nvd.nist.gov/vuln/detail/CVE-2002-1379
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1380">
    <PublicDate>2002-12-17T00:00:00</PublicDate>
    <Bugzilla id="1616901" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616901" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1380
https://nvd.nist.gov/vuln/detail/CVE-2002-1380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1383">
    <PublicDate>2002-12-19T00:00:00</PublicDate>
    <Bugzilla id="1616902" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616902" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1383
https://nvd.nist.gov/vuln/detail/CVE-2002-1383
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1384">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-23T00:00:00</PublicDate>
    <Bugzilla id="1616903" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616903" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:307">RHSA-2002:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:216">RHSA-2003:216</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:295">RHSA-2002:295</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:037">RHSA-2003:037</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:307">RHSA-2002:307</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1384
https://nvd.nist.gov/vuln/detail/CVE-2002-1384
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1391">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-11-25T00:00:00</PublicDate>
    <Bugzilla id="1616904" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616904" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:008">RHSA-2003:008</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:008">RHSA-2003:008</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1391
https://nvd.nist.gov/vuln/detail/CVE-2002-1391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1392">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-11-25T00:00:00</PublicDate>
    <Bugzilla id="1616905" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616905" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
faxspool in mgetty before 1.1.29 uses a world-writable spool directory for outgoing faxes, which allows local users to modify fax transmission privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:008">RHSA-2003:008</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:036">RHSA-2003:036</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:008">RHSA-2003:008</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1392
https://nvd.nist.gov/vuln/detail/CVE-2002-1392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1393">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-12-20T00:00:00</PublicDate>
    <Bugzilla id="1616906" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616906" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in KDE 2 and KDE 3.x through 3.0.5 do not quote certain parameters that are inserted into a shell command, which could allow remote attackers to execute arbitrary commands via (1) URLs, (2) filenames, or (3) e-mail addresses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:003">RHSA-2003:003</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:003">RHSA-2003:003</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1393
https://nvd.nist.gov/vuln/detail/CVE-2002-1393
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1394">
    <PublicDate>2002-10-09T00:00:00</PublicDate>
    <Bugzilla id="1616907" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616907" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Tomcat 4.0.5 and earlier, when using both the invoker servlet and the default servlet, allows remote attackers to read source code for server files or bypass certain protections, a variant of CAN-2002-1148.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:082">RHSA-2003:082</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:075">RHSA-2003:075</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1394
https://nvd.nist.gov/vuln/detail/CVE-2002-1394
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1395">
    <PublicDate>2002-10-28T00:00:00</PublicDate>
    <Bugzilla id="1616908" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616908" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Internet Message (IM) 141-18 and earlier uses predictable file and directory names, which allows local users to (1) obtain unauthorized directory permissions via a temporary directory used by impwagent, and (2) overwrite and create arbitrary files via immknmz.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:038">RHSA-2003:038</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:038">RHSA-2003:038</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:038">RHSA-2003:038</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:039">RHSA-2003:039</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:039">RHSA-2003:039</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:039">RHSA-2003:039</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:039">RHSA-2003:039</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:039">RHSA-2003:039</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:038">RHSA-2003:038</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1395
https://nvd.nist.gov/vuln/detail/CVE-2002-1395
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1396">
    <PublicDate>2002-12-10T00:00:00</PublicDate>
    <Bugzilla id="1616909" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616909" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the wordwrap function in PHP after 4.1.2 and before 4.3.0 may allow attackers to cause a denial of service or execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:017">RHSA-2003:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1396
https://nvd.nist.gov/vuln/detail/CVE-2002-1396
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1397">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-19T00:00:00</PublicDate>
    <Bugzilla id="1616910" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616910" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in the cash_words() function for PostgreSQL 7.2 and earlier allows local users to cause a denial of service and possibly execute arbitrary code via a large negative argument, possibly triggering an integer signedness error or buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1397
https://nvd.nist.gov/vuln/detail/CVE-2002-1397
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1398">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-19T00:00:00</PublicDate>
    <Bugzilla id="1616911" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616911" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the date parser for PostgreSQL before 7.2.2 allows attackers to cause a denial of service and possibly execute arbitrary code via a long date string, aka a vulnerability &quot;in handling long datetime input.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1398
https://nvd.nist.gov/vuln/detail/CVE-2002-1398
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1400">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-20T00:00:00</PublicDate>
    <Bugzilla id="1616912" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616912" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the repeat() function for PostgreSQL before 7.2.2 allows attackers to execute arbitrary code by causing repeat() to generate a large string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1400
https://nvd.nist.gov/vuln/detail/CVE-2002-1400
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1401">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-28T00:00:00</PublicDate>
    <Bugzilla id="1616913" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616913" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in (1) circle_poly, (2) path_encode and (3) path_add (also incorrectly identified as path_addr) for PostgreSQL 7.2.3 and earlier allow attackers to cause a denial of service and possibly execute arbitrary code, possibly as a result of an integer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1401
https://nvd.nist.gov/vuln/detail/CVE-2002-1401
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1402">
    <PublicDate>2002-08-28T00:00:00</PublicDate>
    <Bugzilla id="1616914" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616914" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in the (1) TZ and (2) SET TIME ZONE enivronment variables for PostgreSQL 7.2.1 and earlier allow local users to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:010">RHSA-2003:010</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:001">RHSA-2003:001</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:301">RHSA-2002:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1402
https://nvd.nist.gov/vuln/detail/CVE-2002-1402
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1405">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-08-19T00:00:00</PublicDate>
    <Bugzilla id="1616915" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616915" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:030">RHSA-2003:030</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:029">RHSA-2003:029</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:030">RHSA-2003:030</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1405
https://nvd.nist.gov/vuln/detail/CVE-2002-1405
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1467">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-08-08T00:00:00</PublicDate>
    <Bugzilla id="1616916" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616916" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Macromedia Flash Plugin before 6,0,47,0 allows remote attackers to bypass the same-domain restriction and read arbitrary files via (1) an HTTP redirect, (2) a &quot;file://&quot; base in a web document, or (3) a relative URL from a web archive (mht file).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:027">RHSA-2003:027</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:026">RHSA-2003:026</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1467
https://nvd.nist.gov/vuln/detail/CVE-2002-1467
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1472">
    <PublicDate>2002-09-18T00:00:00</PublicDate>
    <Bugzilla id="1616917" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616917" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in libX11.so in xfree86, when used in setuid or setgid programs, allows local users to gain root privileges via a modified LD_PRELOAD environment variable that points to a malicious module.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:066">RHSA-2003:066</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:067">RHSA-2003:067</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1472
https://nvd.nist.gov/vuln/detail/CVE-2002-1472
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1508">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-12-06T00:00:00</PublicDate>
    <Bugzilla id="1616918" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616918" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
slapd in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows local users to overwrite arbitrary files via a race condition during the creation of a log file for rejected replication requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:208">RHSA-2003:208</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:040">RHSA-2003:040</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:312">RHSA-2002:312</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1508
https://nvd.nist.gov/vuln/detail/CVE-2002-1508
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1509">
    <PublicDate>2002-10-08T00:00:00</PublicDate>
    <Bugzilla id="1616919" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616919" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:058">RHSA-2003:058</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:057">RHSA-2003:057</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:057">RHSA-2003:057</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:057">RHSA-2003:057</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:058">RHSA-2003:058</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1509
https://nvd.nist.gov/vuln/detail/CVE-2002-1509
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1510">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2001-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616920" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616920" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xdm, with the authComplain variable set to false, allows arbitrary attackers to connect to the X server if the xdm auth directory does not exist.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1510
https://nvd.nist.gov/vuln/detail/CVE-2002-1510
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1511">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-10-11T00:00:00</PublicDate>
    <Bugzilla id="1616921" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616921" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The vncserver wrapper for vnc before 3.3.3r2-21 uses the rand() function instead of srand(), which causes vncserver to generate weak cookies.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:068">RHSA-2003:068</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:041">RHSA-2003:041</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1511
https://nvd.nist.gov/vuln/detail/CVE-2002-1511
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1563">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2002-10-30T00:00:00</PublicDate>
    <Bugzilla id="1616922" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616922" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
stunnel 4.0.3 and earlier allows attackers to cause a denial of service (crash) via SIGCHLD signal handler race conditions that cause an inconsistency in the child counter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:223">RHSA-2003:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:223">RHSA-2003:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:223">RHSA-2003:223</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:221">RHSA-2003:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:221">RHSA-2003:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:221">RHSA-2003:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:221">RHSA-2003:221</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:223">RHSA-2003:223</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1563
https://nvd.nist.gov/vuln/detail/CVE-2002-1563
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1565">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-12-12T00:00:00</PublicDate>
    <Bugzilla id="1616923" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616923" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:372">RHSA-2003:372</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:372">RHSA-2003:372</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:372">RHSA-2003:372</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:372">RHSA-2003:372</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1565
https://nvd.nist.gov/vuln/detail/CVE-2002-1565
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1568">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-10-02T00:00:00</PublicDate>
    <Bugzilla id="1616924" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616924" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.6e uses assertions when detecting buffer overflow attacks instead of less severe mechanisms, which allows remote attackers to cause a denial of service (crash) via certain messages that cause OpenSSL to abort from a failed assertion, as demonstrated using SSLv2 CLIENT_MASTER_KEY messages, which are not properly handled in s2_srvr.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:157">RHSA-2002:157</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1568
https://nvd.nist.gov/vuln/detail/CVE-2002-1568
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1571">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-04-17T00:00:00</PublicDate>
    <Bugzilla id="1616925" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616925" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The linux 2.4 kernel before 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:128">RHSA-2002:128</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1571
https://nvd.nist.gov/vuln/detail/CVE-2002-1571
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1572">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-27T00:00:00</PublicDate>
    <Bugzilla id="1616926" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616926" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signed integer overflow in the bttv_read function in the bttv driver (bttv-driver.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:227">RHSA-2002:227</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:206">RHSA-2002:206</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1572
https://nvd.nist.gov/vuln/detail/CVE-2002-1572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1573">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-26T00:00:00</PublicDate>
    <Bugzilla id="1616927" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616927" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the pcilynx ieee1394 firewire driver (pcilynx.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors, related to &quot;wrap handling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-10-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:227">RHSA-2002:227</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:206">RHSA-2002:206</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1573
https://nvd.nist.gov/vuln/detail/CVE-2002-1573
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1574">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-26T00:00:00</PublicDate>
    <Bugzilla id="1616928" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616928" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ixj telephony card driver in Linux before 2.4.20 has unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:205">RHSA-2002:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2002-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:206">RHSA-2002:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1574
https://nvd.nist.gov/vuln/detail/CVE-2002-1574
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1642">
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 7.2.1 and 7.2.2 allows local users to delete transaction log (pg_clog) data and cause a denial of service (data loss) via the VACUUM command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of PostgreSQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1642
https://nvd.nist.gov/vuln/detail/CVE-2002-1642
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1648">
    <Details source="Mitre" xml:lang="en:us">
Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail before 1.2.3 allows remote attackers to send email as other users via an IMG URL with modified send_to and subject parameters.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1648
https://nvd.nist.gov/vuln/detail/CVE-2002-1648
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1649">
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in read_body.php in SquirrelMail before 1.2.3 allows remote attackers to execute arbitrary Javascript via a javascript: URL in an IMG tag.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1649
https://nvd.nist.gov/vuln/detail/CVE-2002-1649
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1650">
    <Details source="Mitre" xml:lang="en:us">
The spell checker plugin (check_me.mod.php) for SquirrelMail before 1.2.3 allows remote attackers to execute arbitrary commands via a modified sqspell_command parameter.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1650
https://nvd.nist.gov/vuln/detail/CVE-2002-1650
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1850">
    <Details source="Mitre" xml:lang="en:us">
mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote attackers to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Apache HTTP server as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1850
https://nvd.nist.gov/vuln/detail/CVE-2002-1850
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1903">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-06-07T00:00:00</PublicDate>
    <Bugzilla id="162899" url="https://bugzilla.redhat.com/show_bug.cgi?id=162899" xml:lang="en:us">
pine username disclosure issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1903
https://nvd.nist.gov/vuln/detail/CVE-2002-1903
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-1914">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2002-07-17T00:00:00</PublicDate>
    <Bugzilla id="1616929" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616929" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:583">RHSA-2005:583</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:583">RHSA-2005:583</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:583">RHSA-2005:583</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:583">RHSA-2005:583</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-1914
https://nvd.nist.gov/vuln/detail/CVE-2002-1914
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2013">
    <Details source="Mitre" xml:lang="en:us">
Mozilla 0.9.6 and earlier and Netscape 6.2 and earlier allows remote attackers to steal cookies from another domain via a link with a hex-encoded null character (%00) followed by the target domain.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Mozilla as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2013
https://nvd.nist.gov/vuln/detail/CVE-2002-2013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2043">
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue only affects a third-party patch to Cyrus SASL, not distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2043
https://nvd.nist.gov/vuln/detail/CVE-2002-2043
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2061">
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Netscape 6.2.3 and Mozilla 1.0 and earlier allows remote attackers to crash client browsers and execute arbitrary code via a PNG image with large width and height values and an 8-bit or 16-bit alpha channel.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Mozilla as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2061
https://nvd.nist.gov/vuln/detail/CVE-2002-2061
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2103">
    <Details source="Mitre" xml:lang="en:us">
Apache before 1.3.24, when writing to the log file, records a spoofed hostname from the reverse lookup of an IP address, even when a double-reverse lookup fails, which allows remote attackers to hide the original source of activities.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Apache HTTP server as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2103
https://nvd.nist.gov/vuln/detail/CVE-2002-2103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2185">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-25T00:00:00</PublicDate>
    <Bugzilla id="1616930" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616930" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2185
https://nvd.nist.gov/vuln/detail/CVE-2002-2185
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2196">
    <Details source="Mitre" xml:lang="en:us">
Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2196
https://nvd.nist.gov/vuln/detail/CVE-2002-2196
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2204">
    <Details source="Mitre" xml:lang="en:us">
The default --checksig setting in RPM Package Manager 4.0.4 checks that a package's signature is valid without listing who signed it, which can allow remote attackers to make it appear that a malicious package comes from a trusted source.
    </Details>
    <Statement xml:lang="en:us">
We do not believe this is a security vulnerability.  This is the documented and expected behaviour of rpm.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2204
https://nvd.nist.gov/vuln/detail/CVE-2002-2204
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2210">
    <Details source="Mitre" xml:lang="en:us">
The installation of OpenOffice 1.0.1 allows local users to overwrite files and possibly gain privileges via a symlink attack on the USERNAME_autoresponse.conf temporary file.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the RPM packages of OpenOffice as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2210
https://nvd.nist.gov/vuln/detail/CVE-2002-2210
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2214">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-02-18T00:00:00</PublicDate>
    <Bugzilla id="1616931" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616931" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The php_if_imap_mime_header_decode function in the IMAP functionality in PHP before 4.2.2 allows remote attackers to cause a denial of service (crash) via an e-mail header with a long &quot;To&quot; header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2214
https://nvd.nist.gov/vuln/detail/CVE-2002-2214
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2215">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-09-07T00:00:00</PublicDate>
    <Bugzilla id="1616932" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616932" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The imap_header function in the IMAP functionality for PHP before 4.3.0 allows remote attackers to cause a denial of service via an e-mail message with a large number of &quot;To&quot; addresses, which triggers an error in the rfc822_write_address function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2215
https://nvd.nist.gov/vuln/detail/CVE-2002-2215
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2438">
    <Details source="Mitre" xml:lang="en:us">
TCP firewalls could be circumvented by sending a SYN Packets with other flags (like e.g. RST flag) set, which was not correctly discarded by the Linux TCP stack after firewalling.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the Linux kernels as shipped with Red
Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2438
https://nvd.nist.gov/vuln/detail/CVE-2002-2438
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2439">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-08-05T00:00:00</PublicDate>
    <Bugzilla id="853906" url="https://bugzilla.redhat.com/show_bug.cgi?id=853906" xml:lang="en:us">
gcc: Integer overflow can occur during the computation of the memory region size for new[] operator
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>3.7</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-295</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-296</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-32</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-34</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>gcc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>gcc43</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>gcc44</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-295</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-296</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-32</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>compat-gcc-34</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>gcc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gcc</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2439
https://nvd.nist.gov/vuln/detail/CVE-2002-2439
    </References>
</Vulnerability>

<Vulnerability name="CVE-2002-2443">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2002-06-16T00:00:00</PublicDate>
    <Bugzilla id="962531" url="https://bugzilla.redhat.com/show_bug.cgi?id=962531" xml:lang="en:us">
krb5: UDP ping-pong flaw in kpasswd
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.0</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:L/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2013-06-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2013:0942">RHSA-2013:0942</Advisory>
        <Package name="krb5">krb5-0:1.6.1-70.el5_9.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2013-06-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2013:0942">RHSA-2013:0942</Advisory>
        <Package name="krb5">krb5-0:1.10.3-10.el6_4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2002-2443
https://nvd.nist.gov/vuln/detail/CVE-2002-2443
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0001">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-01-06T00:00:00</PublicDate>
    <Bugzilla id="1616933" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616933" xml:lang="en:us">
cisco: information leak in ethernet frames.
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>5.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-200</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:190">RHSA-2003:190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0001
https://nvd.nist.gov/vuln/detail/CVE-2003-0001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0015">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-01-20T00:00:00</PublicDate>
    <Bugzilla id="1616934" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616934" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double-free vulnerability in CVS 1.11.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed Directory request, as demonstrated by bypassing write checks to execute Update-prog and Checkin-prog commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:013">RHSA-2003:013</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:012">RHSA-2003:012</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:013">RHSA-2003:013</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0015
https://nvd.nist.gov/vuln/detail/CVE-2003-0015
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0018">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-02-04T00:00:00</PublicDate>
    <Bugzilla id="1616935" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616935" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4.10 through 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-05T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2002:317">RHEA-2002:317</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:025">RHSA-2003:025</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0018
https://nvd.nist.gov/vuln/detail/CVE-2003-0018
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0019">
    <PublicDate>2003-02-07T00:00:00</PublicDate>
    <Bugzilla id="1616936" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616936" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:056">RHSA-2003:056</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0019
https://nvd.nist.gov/vuln/detail/CVE-2003-0019
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0020">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616937" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616937" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:104">RHSA-2003:104</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:082">RHSA-2003:082</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:083">RHSA-2003:083</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0020
https://nvd.nist.gov/vuln/detail/CVE-2003-0020
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0022">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616938" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616938" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;screen dump&quot; feature in rxvt 2.7.8 allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0022
https://nvd.nist.gov/vuln/detail/CVE-2003-0022
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0023">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616939" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616939" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0023
https://nvd.nist.gov/vuln/detail/CVE-2003-0023
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0026">
    <PublicDate>2003-01-15T00:00:00</PublicDate>
    <Bugzilla id="1616940" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616940" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in the error handling routines of the minires library, as used in the NSUPDATE capability for ISC DHCPD 3.0 through 3.0.1RC10, allow remote attackers to execute arbitrary code via a DHCP message containing a long hostname.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:011">RHSA-2003:011</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0026
https://nvd.nist.gov/vuln/detail/CVE-2003-0026
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0028">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616941" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616941" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:090">RHSA-2003:090</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:090">RHSA-2003:090</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:090">RHSA-2003:090</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:212">RHSA-2003:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:089">RHSA-2003:089</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:091">RHSA-2003:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:090">RHSA-2003:090</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0028
https://nvd.nist.gov/vuln/detail/CVE-2003-0028
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0039">
    <PublicDate>2003-01-15T00:00:00</PublicDate>
    <Bugzilla id="1616942" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616942" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ISC dhcrelay (dhcp-relay) 3.0rc9 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (packet storm) via a certain BOOTP packet that is forwarded to a broadcast MAC address, causing an infinite loop that is not restricted by a hop count.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:034">RHSA-2003:034</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0039
https://nvd.nist.gov/vuln/detail/CVE-2003-0039
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0041">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-01-31T00:00:00</PublicDate>
    <Bugzilla id="1616943" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616943" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-01-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:021">RHSA-2003:021</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:020">RHSA-2003:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-01-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:021">RHSA-2003:021</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0041
https://nvd.nist.gov/vuln/detail/CVE-2003-0041
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0056">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-13T00:00:00</PublicDate>
    <Bugzilla id="1616944" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616944" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:041">RHSA-2004:041</Advisory>
        <Package name="slocate">slocate-0:2.7-3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0056
https://nvd.nist.gov/vuln/detail/CVE-2003-0056
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0058">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-01-28T00:00:00</PublicDate>
    <Bugzilla id="1616945" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616945" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MIT Kerberos V5 Key Distribution Center (KDC) before 1.2.5 allows remote authenticated attackers to cause a denial of service (crash) on KDCs within the same realm via a certain protocol request that causes a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0058
https://nvd.nist.gov/vuln/detail/CVE-2003-0058
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0059">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-01-28T00:00:00</PublicDate>
    <Bugzilla id="1616946" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616946" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 before 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0059
https://nvd.nist.gov/vuln/detail/CVE-2003-0059
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0063">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616948" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616948" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:066">RHSA-2003:066</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:067">RHSA-2003:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0063
https://nvd.nist.gov/vuln/detail/CVE-2003-0063
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0066">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616949" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616949" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The rxvt terminal emulator 2.7.8 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:054">RHSA-2003:054</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:055">RHSA-2003:055</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0066
https://nvd.nist.gov/vuln/detail/CVE-2003-0066
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0070">
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616950" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616950" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
VTE, as used by default in gnome-terminal terminal emulator 2.2 and as an option in gnome-terminal 2.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-02-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:053">RHSA-2003:053</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0070
https://nvd.nist.gov/vuln/detail/CVE-2003-0070
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0071">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616952" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616952" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The DEC UDK processing feature in the xterm terminal emulator in XFree86 4.2.99.4 and earlier allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:064">RHSA-2003:064</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:066">RHSA-2003:066</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:067">RHSA-2003:067</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:065">RHSA-2003:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0071
https://nvd.nist.gov/vuln/detail/CVE-2003-0071
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0072">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616953" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616953" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes an out-of-bounds read of an array (aka &quot;array overrun&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0072
https://nvd.nist.gov/vuln/detail/CVE-2003-0072
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0073">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-01-23T00:00:00</PublicDate>
    <Bugzilla id="1616954" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616954" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double-free vulnerability in mysqld for MySQL before 3.23.55 allows attackers with MySQL access to cause a denial of service (crash) via mysql_change_user.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0073
https://nvd.nist.gov/vuln/detail/CVE-2003-0073
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0077">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616955" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616955" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The hanterm (hanterm-xf) terminal emulator 2.0.5 and earlier, and possibly later versions, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0077
https://nvd.nist.gov/vuln/detail/CVE-2003-0077
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0078">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-19T00:00:00</PublicDate>
    <Bugzilla id="1616956" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616956" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the &quot;Vaudenay timing attack.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:063">RHSA-2003:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:063">RHSA-2003:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:063">RHSA-2003:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:205">RHSA-2003:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:062">RHSA-2003:062</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:063">RHSA-2003:063</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:104">RHSA-2003:104</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:082">RHSA-2003:082</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0078
https://nvd.nist.gov/vuln/detail/CVE-2003-0078
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0079">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616957" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616957" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The DEC UDK processing feature in the hanterm (hanterm-xf) terminal emulator before 2.0.5 allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:070">RHSA-2003:070</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:071">RHSA-2003:071</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0079
https://nvd.nist.gov/vuln/detail/CVE-2003-0079
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0080">
    <PublicDate>2003-03-17T00:00:00</PublicDate>
    <Bugzilla id="1616958" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616958" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The iptables ruleset in Gnome-lokkit in Red Hat Linux 8.0 does not include any rules in the FORWARD chain, which could allow attackers to bypass intended access restrictions if packet forwarding is enabled.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:072">RHSA-2003:072</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0080
https://nvd.nist.gov/vuln/detail/CVE-2003-0080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0081">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-03-08T00:00:00</PublicDate>
    <Bugzilla id="1616959" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616959" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in packet-socks.c of the SOCKS dissector for Ethereal 0.8.7 through 0.9.9 allows remote attackers to execute arbitrary code via SOCKS packets containing format string specifiers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0081
https://nvd.nist.gov/vuln/detail/CVE-2003-0081
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0082">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616960" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616960" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Key Distribution Center (KDC) in Kerberos 5 (krb5) 1.2.7 and earlier allows remote, authenticated attackers to cause a denial of service (crash) on KDCs within the same realm using a certain protocol request that causes the KDC to corrupt its heap (aka &quot;buffer underrun&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:091">RHSA-2003:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0082
https://nvd.nist.gov/vuln/detail/CVE-2003-0082
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0083">
    <PublicDate>2003-02-24T00:00:00</PublicDate>
    <Bugzilla id="1616961" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616961" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 1.3 before 1.3.25 and Apache 2.0 before version 2.0.46 does not filter terminal escape sequences from its access logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences, a different vulnerability than CVE-2003-0020.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:104">RHSA-2003:104</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:116">RHSA-2003:116</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:083">RHSA-2003:083</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0083
https://nvd.nist.gov/vuln/detail/CVE-2003-0083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0084">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-04-28T00:00:00</PublicDate>
    <Bugzilla id="1616962" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616962" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_auth_any package in Red Hat Enterprise Linux 2.1 and other operating systems does not properly escape arguments when calling other programs, which allows attackers to execute arbitrary commands via shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:114">RHSA-2003:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:114">RHSA-2003:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:114">RHSA-2003:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:113">RHSA-2003:113</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:113">RHSA-2003:113</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:114">RHSA-2003:114</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0084
https://nvd.nist.gov/vuln/detail/CVE-2003-0084
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0085">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-03-15T00:00:00</PublicDate>
    <Bugzilla id="1616963" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616963" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:226">RHSA-2003:226</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0085
https://nvd.nist.gov/vuln/detail/CVE-2003-0085
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0086">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-03-15T00:00:00</PublicDate>
    <Bugzilla id="1616964" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616964" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:226">RHSA-2003:226</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:095">RHSA-2003:095</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:096">RHSA-2003:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0086
https://nvd.nist.gov/vuln/detail/CVE-2003-0086
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0093">
    <PublicDate>2003-01-10T00:00:00</PublicDate>
    <Bugzilla id="1616965" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616965" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The RADIUS decoder in tcpdump 3.6.2 and earlier allows remote attackers to cause a denial of service (crash) via an invalid RADIUS packet with a header length field of 0, which causes tcpdump to generate data within an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:033">RHSA-2003:033</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:033">RHSA-2003:033</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0093
https://nvd.nist.gov/vuln/detail/CVE-2003-0093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0102">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-03-04T00:00:00</PublicDate>
    <Bugzilla id="1616966" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616966" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in tryelf() in readelf.c of the file command allows attackers to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:087">RHSA-2003:087</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:087">RHSA-2003:087</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:087">RHSA-2003:087</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:086">RHSA-2003:086</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:087">RHSA-2003:087</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0102
https://nvd.nist.gov/vuln/detail/CVE-2003-0102
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0107">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-22T00:00:00</PublicDate>
    <Bugzilla id="1616967" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616967" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the gzprintf function in zlib 1.1.4, when zlib is compiled without vsnprintf or when long inputs are truncated using vsnprintf, allows attackers to cause a denial of service or possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:081">RHSA-2003:081</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:081">RHSA-2003:081</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:081">RHSA-2003:081</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:079">RHSA-2003:079</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:079">RHSA-2003:079</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:079">RHSA-2003:079</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:079">RHSA-2003:079</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:081">RHSA-2003:081</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0107
https://nvd.nist.gov/vuln/detail/CVE-2003-0107
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0108">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-27T00:00:00</PublicDate>
    <Bugzilla id="1616968" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616968" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
isakmp_sub_print in tcpdump 3.6 through 3.7.1 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed ISAKMP packet to UDP port 500, which causes tcpdump to enter an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:085">RHSA-2003:085</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:085">RHSA-2003:085</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:085">RHSA-2003:085</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:085">RHSA-2003:085</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0108
https://nvd.nist.gov/vuln/detail/CVE-2003-0108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0124">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-03-11T00:00:00</PublicDate>
    <Bugzilla id="1616969" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616969" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
man before 1.5l allows attackers to execute arbitrary code via a malformed man file with improper quotes, which causes the my_xsprintf function to return a string with the value &quot;unsafe,&quot; which is then executed as a program via a system call if it is in the search path of the user who runs man.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:134">RHSA-2003:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:134">RHSA-2003:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:134">RHSA-2003:134</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:133">RHSA-2003:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:133">RHSA-2003:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:133">RHSA-2003:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:133">RHSA-2003:133</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:134">RHSA-2003:134</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0124
https://nvd.nist.gov/vuln/detail/CVE-2003-0124
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0127">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-17T00:00:00</PublicDate>
    <Bugzilla id="1616970" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616970" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:103">RHSA-2003:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:145">RHSA-2003:145</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:103">RHSA-2003:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:103">RHSA-2003:103</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:088">RHSA-2003:088</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:098">RHSA-2003:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:190">RHSA-2003:190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:098">RHSA-2003:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:098">RHSA-2003:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:098">RHSA-2003:098</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:135">RHSA-2003:135</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:145">RHSA-2003:145</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0127
https://nvd.nist.gov/vuln/detail/CVE-2003-0127
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0128">
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616971" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616971" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The try_uudecoding function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malicious uuencoded (UUE) header, possibly triggering a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0128
https://nvd.nist.gov/vuln/detail/CVE-2003-0128
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0129">
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616972" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616972" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (memory consumption) via a mail message that is uuencoded multiple times.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0129
https://nvd.nist.gov/vuln/detail/CVE-2003-0129
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0130">
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616973" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616973" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The handle_image function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier does not properly escape HTML characters, which allows remote attackers to inject arbitrary data and HTML via a MIME Content-ID header in a MIME-encoded image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:108">RHSA-2003:108</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0130
https://nvd.nist.gov/vuln/detail/CVE-2003-0130
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0131">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616975" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616975" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and 0.9.7a allow remote attackers to perform an unauthorized RSA private key operation via a modified Bleichenbacher attack that uses a large number of SSL or TLS connections using PKCS #1 v1.5 padding that cause OpenSSL to leak information regarding the relationship between ciphertext and the associated plaintext, aka the &quot;Klima-Pokorny-Rosa attack.&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 4 and 5 are not vulnerable to this issue as they both contain a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:205">RHSA-2003:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:117">RHSA-2003:117</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:116">RHSA-2003:116</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0131
https://nvd.nist.gov/vuln/detail/CVE-2003-0131
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0132">
    <PublicDate>2003-04-02T00:00:00</PublicDate>
    <Bugzilla id="1616977" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616977" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A memory leak in Apache 2.0 through 2.0.44 allows remote attackers to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:139">RHSA-2003:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0132
https://nvd.nist.gov/vuln/detail/CVE-2003-0132
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0133">
    <PublicDate>2003-04-02T00:00:00</PublicDate>
    <Bugzilla id="1616978" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616978" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GtkHTML, as included in Evolution before 1.2.4, allows remote attackers to cause a denial of service (crash) via certain malformed messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:126">RHSA-2003:126</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0133
https://nvd.nist.gov/vuln/detail/CVE-2003-0133
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0135">
    <PublicDate>2003-04-01T00:00:00</PublicDate>
    <Bugzilla id="1616979" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616979" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vsftpd FTP daemon in Red Hat Linux 9 is not compiled against TCP wrappers (tcp_wrappers) but is installed as a standalone service, which inadvertently prevents vsftpd from restricting access as intended.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:084">RHSA-2003:084</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0135
https://nvd.nist.gov/vuln/detail/CVE-2003-0135
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0136">
    <PublicDate>2003-04-09T00:00:00</PublicDate>
    <Bugzilla id="1616980" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616980" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
psbanner in the LPRng package allows local users to overwrite arbitrary files via a symbolic link attack on the /tmp/before file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:150">RHSA-2003:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:150">RHSA-2003:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:150">RHSA-2003:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:142">RHSA-2003:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:225">RHSA-2003:225</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:142">RHSA-2003:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:142">RHSA-2003:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:142">RHSA-2003:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:142">RHSA-2003:142</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:150">RHSA-2003:150</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0136
https://nvd.nist.gov/vuln/detail/CVE-2003-0136
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0138">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616981" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616981" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:091">RHSA-2003:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0138
https://nvd.nist.gov/vuln/detail/CVE-2003-0138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0139">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-19T00:00:00</PublicDate>
    <Bugzilla id="1616982" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616982" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and &quot;ticket splicing.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:168">RHSA-2003:168</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:051">RHSA-2003:051</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:091">RHSA-2003:091</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0139
https://nvd.nist.gov/vuln/detail/CVE-2003-0139
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0140">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-20T00:00:00</PublicDate>
    <Bugzilla id="1616983" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616983" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Mutt 1.4.0 and possibly earlier versions, 1.5.x up to 1.5.3, and other programs that use Mutt code such as Balsa before 2.0.10, allows a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a crafted folder.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:109">RHSA-2003:109</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:111">RHSA-2003:111</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0140
https://nvd.nist.gov/vuln/detail/CVE-2003-0140
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0145">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-25T00:00:00</PublicDate>
    <Bugzilla id="1616984" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616984" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in tcpdump before 3.7.2 related to an inability to &quot;Handle unknown RADIUS attributes properly,&quot; allows remote attackers to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:032">RHSA-2003:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0145
https://nvd.nist.gov/vuln/detail/CVE-2003-0145
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0146">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-02-28T00:00:00</PublicDate>
    <Bugzilla id="1616985" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616985" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via &quot;maths overflow errors&quot; such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:061">RHSA-2003:061</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:061">RHSA-2003:061</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:061">RHSA-2003:061</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:060">RHSA-2003:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:060">RHSA-2003:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:060">RHSA-2003:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:060">RHSA-2003:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:060">RHSA-2003:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:061">RHSA-2003:061</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0146
https://nvd.nist.gov/vuln/detail/CVE-2003-0146
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0147">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-14T00:00:00</PublicDate>
    <Bugzilla id="1616986" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616986" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms (&quot;Karatsuba&quot; and normal).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:205">RHSA-2003:205</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:101">RHSA-2003:101</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:102">RHSA-2003:102</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:3">
        <ProductName>Red Hat Stronghold 3</ProductName>
        <ReleaseDate>2003-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:117">RHSA-2003:117</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:116">RHSA-2003:116</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0147
https://nvd.nist.gov/vuln/detail/CVE-2003-0147
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0150">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-08T00:00:00</PublicDate>
    <Bugzilla id="1616987" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616987" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the &quot;SELECT * INFO OUTFILE&quot; operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:166">RHSA-2003:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:093">RHSA-2003:093</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:094">RHSA-2003:094</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0150
https://nvd.nist.gov/vuln/detail/CVE-2003-0150
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0159">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-03-09T00:00:00</PublicDate>
    <Bugzilla id="1616988" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616988" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the NTLMSSP code for Ethereal 0.9.9 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:076">RHSA-2003:076</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0159
https://nvd.nist.gov/vuln/detail/CVE-2003-0159
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0160">
    <PublicDate>2003-02-11T00:00:00</PublicDate>
    <Bugzilla id="1616989" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616989" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.2.11 allow remote attackers to inject arbitrary HTML code and steal information from a client's web browser.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:112">RHSA-2003:112</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:112">RHSA-2003:112</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0160
https://nvd.nist.gov/vuln/detail/CVE-2003-0160
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0161">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-03-29T00:00:00</PublicDate>
    <Bugzilla id="1616990" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616990" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special &quot;NOCHAR&quot; control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:121">RHSA-2003:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:121">RHSA-2003:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:121">RHSA-2003:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:6.2">
        <ProductName>Red Hat Linux 6.2</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.0">
        <ProductName>Red Hat Linux 7.0</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:227">RHSA-2003:227</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:120">RHSA-2003:120</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:121">RHSA-2003:121</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0161
https://nvd.nist.gov/vuln/detail/CVE-2003-0161
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0165">
    <PublicDate>2003-03-28T00:00:00</PublicDate>
    <Bugzilla id="1616991" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616991" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Eye Of Gnome (EOG) allows attackers to execute arbitrary code via format string specifiers in a command line argument for the file to display.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:128">RHSA-2003:128</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:128">RHSA-2003:128</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0165
https://nvd.nist.gov/vuln/detail/CVE-2003-0165
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0187">
    <PublicDate>2003-05-14T00:00:00</PublicDate>
    <Bugzilla id="1616994" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616994" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The connection tracking core of Netfilter for Linux 2.4.20, with CONFIG_IP_NF_CONNTRACK enabled or the ip_conntrack module loaded, allows remote attackers to cause a denial of service (resource consumption) due to an inconsistency with Linux 2.4.20's support of linked lists, which causes Netfilter to fail to identify connections with an UNCONFIRMED status and use large timeouts.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0187
https://nvd.nist.gov/vuln/detail/CVE-2003-0187
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0188">
    <PublicDate>2003-04-27T00:00:00</PublicDate>
    <Bugzilla id="1616995" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616995" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:167">RHSA-2003:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:167">RHSA-2003:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:167">RHSA-2003:167</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:169">RHSA-2003:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:169">RHSA-2003:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:169">RHSA-2003:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:169">RHSA-2003:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:169">RHSA-2003:169</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:167">RHSA-2003:167</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0188
https://nvd.nist.gov/vuln/detail/CVE-2003-0188
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0189">
    <PublicDate>2003-05-28T00:00:00</PublicDate>
    <Bugzilla id="1616996" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616996" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The authentication module for Apache 2.0.40 through 2.0.45 on Unix does not properly handle threads safely when using the crypt_r or crypt functions, which allows remote attackers to cause a denial of service (failed Basic authentication with valid usernames and passwords) when a threaded MPM is used.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:186">RHSA-2003:186</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:186">RHSA-2003:186</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0189
https://nvd.nist.gov/vuln/detail/CVE-2003-0189
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0190">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-04-30T00:00:00</PublicDate>
    <Bugzilla id="1616997" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616997" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:224">RHSA-2003:224</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:224">RHSA-2003:224</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:224">RHSA-2003:224</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:222">RHSA-2003:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:222">RHSA-2003:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:222">RHSA-2003:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:222">RHSA-2003:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:222">RHSA-2003:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:224">RHSA-2003:224</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0190
https://nvd.nist.gov/vuln/detail/CVE-2003-0190
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0192">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-07-09T00:00:00</PublicDate>
    <Bugzilla id="1616998" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616998" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 2 before 2.0.47, and certain versions of mod_ssl for Apache 1.3, do not properly handle &quot;certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one,&quot; which could cause Apache to use the weak ciphersuite.
    </Details>
    <Statement xml:lang="en:us">
This issue affected Red Hat Enterprise Linux 2.1 and an update was released to correct it:
http://rhn.redhat.com/errata/RHSA-2003-244.html

Red Hat Enterprise Linux 3 contained a backported patch to correct this issue since release.  This issue does not affect the versions of Apache in Enterprise Linux 4 or later.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:243">RHSA-2003:243</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:244">RHSA-2003:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:290">RHSA-2003:290</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4">
        <ProductName>Stronghold 4 for Red Hat Enterprise Linux</ProductName>
        <ReleaseDate>2003-10-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:301">RHSA-2003:301</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0192
https://nvd.nist.gov/vuln/detail/CVE-2003-0192
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0194">
    <PublicDate>2003-05-05T00:00:00</PublicDate>
    <Bugzilla id="1616999" url="https://bugzilla.redhat.com/show_bug.cgi?id=1616999" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
tcpdump does not properly drop privileges to the pcap user when starting up.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:174">RHSA-2003:174</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:214">RHSA-2003:214</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:174">RHSA-2003:174</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:174">RHSA-2003:174</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:174">RHSA-2003:174</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:174">RHSA-2003:174</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:151">RHSA-2003:151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0194
https://nvd.nist.gov/vuln/detail/CVE-2003-0194
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0195">
    <PublicDate>2003-05-27T00:00:00</PublicDate>
    <Bugzilla id="1617000" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617000" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:171">RHSA-2003:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:171">RHSA-2003:171</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:171">RHSA-2003:171</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0195
https://nvd.nist.gov/vuln/detail/CVE-2003-0195
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0196">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-04-07T00:00:00</PublicDate>
    <Bugzilla id="1617001" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617001" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:226">RHSA-2003:226</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0196
https://nvd.nist.gov/vuln/detail/CVE-2003-0196
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0201">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-04-07T00:00:00</PublicDate>
    <Bugzilla id="1617002" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617002" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:226">RHSA-2003:226</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:137">RHSA-2003:137</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:138">RHSA-2003:138</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0201
https://nvd.nist.gov/vuln/detail/CVE-2003-0201
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0204">
    <PublicDate>2003-04-03T00:00:00</PublicDate>
    <Bugzilla id="1617003" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617003" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDE 2 and KDE 3.1.1 and earlier 3.x versions allows attackers to execute arbitrary commands via (1) PostScript (PS) or (2) PDF files, related to missing -dPARANOIDSAFER and -dSAFER arguments when using the kghostview Ghostscript viewer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:146">RHSA-2003:146</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:146">RHSA-2003:146</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:146">RHSA-2003:146</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:002">RHSA-2003:002</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:146">RHSA-2003:146</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0204
https://nvd.nist.gov/vuln/detail/CVE-2003-0204
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0211">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-04-18T00:00:00</PublicDate>
    <Bugzilla id="1617004" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617004" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in xinetd 2.3.10 allows remote attackers to cause a denial of service (memory consumption) via a large number of rejected connections.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:161">RHSA-2003:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:161">RHSA-2003:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:161">RHSA-2003:161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:160">RHSA-2003:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:228">RHSA-2003:228</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:160">RHSA-2003:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:160">RHSA-2003:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:160">RHSA-2003:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:160">RHSA-2003:160</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:161">RHSA-2003:161</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0211
https://nvd.nist.gov/vuln/detail/CVE-2003-0211
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0244">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-04-05T00:00:00</PublicDate>
    <Bugzilla id="1617005" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617005" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:145">RHSA-2003:145</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:190">RHSA-2003:190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-05-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:145">RHSA-2003:145</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0244
https://nvd.nist.gov/vuln/detail/CVE-2003-0244
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0245">
    <PublicDate>2003-05-28T00:00:00</PublicDate>
    <Bugzilla id="1617006" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617006" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in the apr_psprintf function in the Apache Portable Runtime (APR) library for Apache 2.0.37 through 2.0.45 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long strings, as demonstrated using XML objects to mod_dav, and possibly other vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:186">RHSA-2003:186</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:186">RHSA-2003:186</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0245
https://nvd.nist.gov/vuln/detail/CVE-2003-0245
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0246">
    <PublicDate>2003-05-12T00:00:00</PublicDate>
    <Bugzilla id="1617007" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617007" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:147">RHSA-2003:147</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0246
https://nvd.nist.gov/vuln/detail/CVE-2003-0246
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0247">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-03T00:00:00</PublicDate>
    <Bugzilla id="1617008" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617008" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (&quot;kernel oops&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:190">RHSA-2003:190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0247
https://nvd.nist.gov/vuln/detail/CVE-2003-0247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0248">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-06-03T00:00:00</PublicDate>
    <Bugzilla id="1617009" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617009" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0248
https://nvd.nist.gov/vuln/detail/CVE-2003-0248
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0251">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617010" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617010" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ypserv NIS server before 2.7 allows remote attackers to cause a denial of service via a TCP client request that does not respond to the server, which causes ypserv to block.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:201">RHSA-2003:201</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:201">RHSA-2003:201</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:173">RHSA-2003:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:229">RHSA-2003:229</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:173">RHSA-2003:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:173">RHSA-2003:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:173">RHSA-2003:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:173">RHSA-2003:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:201">RHSA-2003:201</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0251
https://nvd.nist.gov/vuln/detail/CVE-2003-0251
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0252">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-07-14T00:00:00</PublicDate>
    <Bugzilla id="1617011" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617011" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines.
    </Details>
    <Statement xml:lang="en:us">
This issue has been addressed in nfs-utils packages as shipped in Red Hat
Enterprise Linux 2 via https://rhn.redhat.com/errata/RHSA-2003-207.html.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:207">RHSA-2003:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:207">RHSA-2003:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:207">RHSA-2003:207</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:206">RHSA-2003:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:206">RHSA-2003:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:206">RHSA-2003:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:206">RHSA-2003:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:206">RHSA-2003:206</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:207">RHSA-2003:207</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0252
https://nvd.nist.gov/vuln/detail/CVE-2003-0252
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0253">
    <PublicDate>2003-07-09T00:00:00</PublicDate>
    <Bugzilla id="1617012" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617012" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The prefork MPM in Apache 2 before 2.0.47 does not properly handle certain errors from accept, which could lead to a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0253
https://nvd.nist.gov/vuln/detail/CVE-2003-0253
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0254">
    <PublicDate>2003-07-09T00:00:00</PublicDate>
    <Bugzilla id="1617013" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617013" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 2 before 2.0.47, when running on an IPv6 host, allows attackers to cause a denial of service (CPU consumption by infinite loop) when the FTP proxy server fails to create an IPv6 socket.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:240">RHSA-2003:240</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0254
https://nvd.nist.gov/vuln/detail/CVE-2003-0254
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0255">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617014" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617014" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:176">RHSA-2003:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:176">RHSA-2003:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:176">RHSA-2003:176</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:175">RHSA-2003:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:175">RHSA-2003:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:175">RHSA-2003:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:175">RHSA-2003:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:175">RHSA-2003:175</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:176">RHSA-2003:176</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0255
https://nvd.nist.gov/vuln/detail/CVE-2003-0255
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0282">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-05-09T00:00:00</PublicDate>
    <Bugzilla id="1617015" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617015" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in UnZip 5.50 allows attackers to overwrite arbitrary files via invalid characters between two . (dot) characters, which are filtered and result in a &quot;..&quot; sequence.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:200">RHSA-2003:200</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:200">RHSA-2003:200</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:200">RHSA-2003:200</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:199">RHSA-2003:199</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:218">RHSA-2003:218</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:199">RHSA-2003:199</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:199">RHSA-2003:199</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:199">RHSA-2003:199</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:199">RHSA-2003:199</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:200">RHSA-2003:200</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0282
https://nvd.nist.gov/vuln/detail/CVE-2003-0282
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0297">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-14T00:00:00</PublicDate>
    <Bugzilla id="1617017" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617017" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
c-client IMAP Client, as used in imap-2002b and Pine 4.53, allows remote malicious IMAP servers to cause a denial of service (crash) and possibly execute arbitrary code via certain large (1) literal and (2) mailbox size values that cause either integer signedness errors or integer overflow errors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:015">RHSA-2005:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:114">RHSA-2005:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:015">RHSA-2005:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:114">RHSA-2005:114</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:015">RHSA-2005:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:015">RHSA-2005:015</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:114">RHSA-2005:114</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0297
https://nvd.nist.gov/vuln/detail/CVE-2003-0297
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0328">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-05T00:00:00</PublicDate>
    <Bugzilla id="1617018" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617018" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
EPIC IRC Client (EPIC4) pre2.002, pre2.003, and possibly later versions, allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via a CTCP request from a large nickname, which causes an incorrect length calculation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:342">RHSA-2003:342</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:342">RHSA-2003:342</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:342">RHSA-2003:342</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0328
https://nvd.nist.gov/vuln/detail/CVE-2003-0328
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0354">
    <PublicDate>2003-05-18T00:00:00</PublicDate>
    <Bugzilla id="1617019" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617019" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:182">RHSA-2003:182</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:182">RHSA-2003:182</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:182">RHSA-2003:182</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:181">RHSA-2003:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:209">RHSA-2003:209</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:181">RHSA-2003:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:181">RHSA-2003:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:181">RHSA-2003:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:181">RHSA-2003:181</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:182">RHSA-2003:182</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0354
https://nvd.nist.gov/vuln/detail/CVE-2003-0354
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0356">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617020" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617020" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0356
https://nvd.nist.gov/vuln/detail/CVE-2003-0356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0357">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617021" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617021" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflow vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) Mount and (2) PPP dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0357
https://nvd.nist.gov/vuln/detail/CVE-2003-0357
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0364">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-03T00:00:00</PublicDate>
    <Bugzilla id="1617022" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617022" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:195">RHSA-2003:195</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:190">RHSA-2003:190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:187">RHSA-2003:187</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0364
https://nvd.nist.gov/vuln/detail/CVE-2003-0364
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0367">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-07-02T00:00:00</PublicDate>
    <Bugzilla id="1850889" url="https://bugzilla.redhat.com/show_bug.cgi?id=1850889" xml:lang="en:us">
gzip: symlink attack on temporary files leads to arbitrary file overwrite
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.2</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>(CWE-20|CWE-377)</CWE>
    <Details source="Mitre" xml:lang="en:us">
znew in the gzip package allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gzip</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gzip</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gzip</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gzip</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0367
https://nvd.nist.gov/vuln/detail/CVE-2003-0367
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0370">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-02T00:00:00</PublicDate>
    <Bugzilla id="1617023" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617023" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:193">RHSA-2003:193</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:193">RHSA-2003:193</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:193">RHSA-2003:193</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:192">RHSA-2003:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:192">RHSA-2003:192</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:193">RHSA-2003:193</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0370
https://nvd.nist.gov/vuln/detail/CVE-2003-0370
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0386">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-06-05T00:00:00</PublicDate>
    <Bugzilla id="1617024" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617024" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass &quot;from=&quot; and &quot;user@host&quot; address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0698">RHSA-2006:0698</Advisory>
        <Package name="openssh">openssh-0:3.1p1-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0298">RHSA-2006:0298</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0386
https://nvd.nist.gov/vuln/detail/CVE-2003-0386
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0388">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-06-16T00:00:00</PublicDate>
    <Bugzilla id="1617025" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617025" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pam_wheel in Linux-PAM 0.78, with the trust option enabled and the use_uid option disabled, allows local users to spoof log entries and gain privileges by causing getlogin() to return a spoofed user name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:304">RHSA-2004:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:304">RHSA-2004:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:304">RHSA-2004:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:304">RHSA-2004:304</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0388
https://nvd.nist.gov/vuln/detail/CVE-2003-0388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0427">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-06-13T00:00:00</PublicDate>
    <Bugzilla id="1617026" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617026" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in mikmod 3.1.6 and earlier allows remote attackers to execute arbitrary code via an archive file that contains a file with a long filename.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:506">RHSA-2005:506</Advisory>
        <Package name="mikmod">mikmod-0:3.1.6-22.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:506">RHSA-2005:506</Advisory>
        <Package name="mikmod">mikmod-0:3.1.6-32.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0427
https://nvd.nist.gov/vuln/detail/CVE-2003-0427
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0428">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617027" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617027" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the DCERPC (DCE/RPC) dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service (memory consumption) via a certain NDR string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0428
https://nvd.nist.gov/vuln/detail/CVE-2003-0428
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0429">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617028" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617028" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The OSI dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via invalid IPv4 or IPv6 prefix lengths, possibly triggering a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0429
https://nvd.nist.gov/vuln/detail/CVE-2003-0429
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0430">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617029" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617029" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SPNEGO dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service (crash) via an invalid ASN.1 value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0430
https://nvd.nist.gov/vuln/detail/CVE-2003-0430
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0431">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617030" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617030" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The tvb_get_nstringz0 function in Ethereal 0.9.12 and earlier does not properly handle a zero-length buffer size, with unknown consequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0431
https://nvd.nist.gov/vuln/detail/CVE-2003-0431
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0432">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617031" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617031" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.12 and earlier does not handle certain strings properly, with unknown consequences, in the (1) BGP, (2) WTP, (3) DNS, (4) 802.11, (5) ISAKMP, (6) WSP, (7) CLNP, (8) ISIS, and (9) RMI dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:203">RHSA-2003:203</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:077">RHSA-2003:077</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0432
https://nvd.nist.gov/vuln/detail/CVE-2003-0432
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0434">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-13T00:00:00</PublicDate>
    <Bugzilla id="1617032" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617032" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:197">RHSA-2003:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:197">RHSA-2003:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:197">RHSA-2003:197</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:196">RHSA-2003:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:216">RHSA-2003:216</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:196">RHSA-2003:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:196">RHSA-2003:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:196">RHSA-2003:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:196">RHSA-2003:196</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:197">RHSA-2003:197</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0434
https://nvd.nist.gov/vuln/detail/CVE-2003-0434
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0440">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-06-06T00:00:00</PublicDate>
    <Bugzilla id="1617033" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617033" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) semi MIME library 1.14.5 and earlier, and (2) wemi 1.14.0 and possibly other versions, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:231">RHSA-2003:231</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:231">RHSA-2003:231</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:231">RHSA-2003:231</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:234">RHSA-2003:234</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:234">RHSA-2003:234</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:234">RHSA-2003:234</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:234">RHSA-2003:234</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:234">RHSA-2003:234</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:231">RHSA-2003:231</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0440
https://nvd.nist.gov/vuln/detail/CVE-2003-0440
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0442">
    <PublicDate>2003-05-11T00:00:00</PublicDate>
    <Bugzilla id="1617034" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617034" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the transparent SID support capability for PHP before 4.3.2 (session.use_trans_sid) allows remote attackers to insert arbitrary script via the PHPSESSID parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:204">RHSA-2003:204</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:204">RHSA-2003:204</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0442
https://nvd.nist.gov/vuln/detail/CVE-2003-0442
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0455">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-28T00:00:00</PublicDate>
    <Bugzilla id="1617035" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617035" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The imagemagick libmagick library 5.5 and earlier creates temporary files insecurely, which allows local users to create or overwrite arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0455
https://nvd.nist.gov/vuln/detail/CVE-2003-0455
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0459">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-07-29T00:00:00</PublicDate>
    <Bugzilla id="1617036" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617036" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDE Konqueror for KDE 3.1.2 and earlier does not remove authentication credentials from URLs of the &quot;user:password@host&quot; form in the HTTP-Referer header, which could allow remote web sites to steal the credentials for pages that link to the sites.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:236">RHSA-2003:236</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:236">RHSA-2003:236</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:236">RHSA-2003:236</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:235">RHSA-2003:235</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:235">RHSA-2003:235</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:235">RHSA-2003:235</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:235">RHSA-2003:235</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:235">RHSA-2003:235</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:236">RHSA-2003:236</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0459
https://nvd.nist.gov/vuln/detail/CVE-2003-0459
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0461">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617037" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617037" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2002-11-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2002:263">RHSA-2002:263</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0461
https://nvd.nist.gov/vuln/detail/CVE-2003-0461
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0462">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-08-21T00:00:00</PublicDate>
    <Bugzilla id="1617038" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617038" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0462
https://nvd.nist.gov/vuln/detail/CVE-2003-0462
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0464">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617039" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617039" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0464
https://nvd.nist.gov/vuln/detail/CVE-2003-0464
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0465">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-07-11T00:00:00</PublicDate>
    <Bugzilla id="1617040" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617040" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0465
https://nvd.nist.gov/vuln/detail/CVE-2003-0465
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0466">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-07-31T00:00:00</PublicDate>
    <Bugzilla id="1617041" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617041" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:246">RHSA-2003:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:246">RHSA-2003:246</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:245">RHSA-2003:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:245">RHSA-2003:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:245">RHSA-2003:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:245">RHSA-2003:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:246">RHSA-2003:246</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0466
https://nvd.nist.gov/vuln/detail/CVE-2003-0466
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0468">
    <PublicDate>2003-08-03T00:00:00</PublicDate>
    <Bugzilla id="1617042" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617042" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct &quot;bounce scans&quot; or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a &quot;!&quot; string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0468
https://nvd.nist.gov/vuln/detail/CVE-2003-0468
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0476">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-27T00:00:00</PublicDate>
    <Bugzilla id="1617043" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617043" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:408">RHSA-2003:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:368">RHSA-2003:368</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:408">RHSA-2003:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:408">RHSA-2003:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:408">RHSA-2003:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:408">RHSA-2003:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:368">RHSA-2003:368</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0476
https://nvd.nist.gov/vuln/detail/CVE-2003-0476
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0501">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-06-20T00:00:00</PublicDate>
    <Bugzilla id="1617044" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617044" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0501
https://nvd.nist.gov/vuln/detail/CVE-2003-0501
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0539">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-07-08T00:00:00</PublicDate>
    <Bugzilla id="1617045" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617045" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
skk (Simple Kana to Kanji conversion program) 12.1 and earlier, and the ddskk package which is based on skk, creates temporary files insecurely, which allows local users to overwrite arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:242">RHSA-2003:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:242">RHSA-2003:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:242">RHSA-2003:242</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:241">RHSA-2003:241</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:241">RHSA-2003:241</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:241">RHSA-2003:241</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:241">RHSA-2003:241</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:241">RHSA-2003:241</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:242">RHSA-2003:242</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0539
https://nvd.nist.gov/vuln/detail/CVE-2003-0539
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0540">
    <PublicDate>2003-08-03T00:00:00</PublicDate>
    <Bugzilla id="1617046" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617046" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the &quot;.!&quot; string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a &quot;.!&quot; string, which causes an instance of the SMTP listener to lock up.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:251">RHSA-2003:251</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0540
https://nvd.nist.gov/vuln/detail/CVE-2003-0540
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0541">
    <PublicDate>2003-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617047" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617047" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gtkhtml before 1.1.10, as used in Evolution, allows remote attackers to cause a denial of service (crash) via a malformed message that causes a null pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:264">RHSA-2003:264</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:264">RHSA-2003:264</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:264">RHSA-2003:264</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0541
https://nvd.nist.gov/vuln/detail/CVE-2003-0541
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0542">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-10-29T00:00:00</PublicDate>
    <Bugzilla id="1617048" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617048" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:015">RHSA-2004:015</Advisory>
        <Package name="httpd">httpd-0:2.0.46-26.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:360">RHSA-2003:360</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:360">RHSA-2003:360</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:360">RHSA-2003:360</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:405">RHSA-2003:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:405">RHSA-2003:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:405">RHSA-2003:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:320">RHSA-2003:320</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:320">RHSA-2003:320</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:360">RHSA-2003:360</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:139">RHSA-2004:139</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0542
https://nvd.nist.gov/vuln/detail/CVE-2003-0542
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0543">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-30T00:00:00</PublicDate>
    <Bugzilla id="104893" url="https://bugzilla.redhat.com/show_bug.cgi?id=104893" xml:lang="en:us">
CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values.
    </Details>
    <Statement xml:lang="en:us">
For Red Hat Enterprise Linux 2.1 OpenSSL packages (openssl, openssl096, openssl095a) issue was addressed via RHSA-2003:293.

The OpenSSL packages in Red Hat Enterprise Linux 3 and 4 (openssl, openssl096b) contain a backported patch since their initial release.

The OpenSSL packages in Red Hat Enterprise Linux 5 are based on fixed upstream release (openssl), or contain backported patch since their initial release (openssl097a).
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:292">RHSA-2003:292</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:290">RHSA-2003:290</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0543
https://nvd.nist.gov/vuln/detail/CVE-2003-0543
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0544">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-30T00:00:00</PublicDate>
    <Bugzilla id="104893" url="https://bugzilla.redhat.com/show_bug.cgi?id=104893" xml:lang="en:us">
CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.6 and 0.9.7 does not properly track the number of characters in certain ASN.1 inputs, which allows remote attackers to cause a denial of service (crash) via an SSL client certificate that causes OpenSSL to read past the end of a buffer when the long form is used.
    </Details>
    <Statement xml:lang="en:us">
For Red Hat Enterprise Linux 2.1 OpenSSL packages (openssl, openssl096, openssl095a) issue was addressed via RHSA-2003:293.

The OpenSSL packages in Red Hat Enterprise Linux 3 and 4 (openssl, openssl096b) contain a backported patch since their initial release.

The OpenSSL packages in Red Hat Enterprise Linux 5 are based on fixed upstream release (openssl), or contain backported patch since their initial release (openssl097a).
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:291">RHSA-2003:291</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:292">RHSA-2003:292</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:293">RHSA-2003:293</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:290">RHSA-2003:290</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0544
https://nvd.nist.gov/vuln/detail/CVE-2003-0544
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0545">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-30T00:00:00</PublicDate>
    <Bugzilla id="104893" url="https://bugzilla.redhat.com/show_bug.cgi?id=104893" xml:lang="en:us">
CAN-2003-0543/0544 OpenSSL ASN.1 protocol crashes
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an SSL client certificate with a certain invalid ASN.1 encoding.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The OpenSSL packages in Red Hat Enterprise Linux 2.1 were not affected by this issue.

The OpenSSL packages in Red Hat Enterprise Linux 3 and 4 contain a backported patch since their initial release (openssl), or were not affected by this issue (openssl096b).

The OpenSSL packages in Red Hat Enterprise Linux 5 are based on fixed upstream release (openssl), or contain backported patch since their initial release (openssl097a).
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:292">RHSA-2003:292</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0545
https://nvd.nist.gov/vuln/detail/CVE-2003-0545
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0546">
    <PublicDate>2003-08-08T00:00:00</PublicDate>
    <Bugzilla id="1617049" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617049" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
up2date 3.0.7 and 3.1.23 does not properly verify RPM GPG signatures, which could allow remote attackers to cause unsigned packages to be installed from the Red Hat Network, if that network is compromised.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:255">RHSA-2003:255</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:255">RHSA-2003:255</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0546
https://nvd.nist.gov/vuln/detail/CVE-2003-0546
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0547">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617050" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617050" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GDM before 2.4.1.6, when using the &quot;examine session errors&quot; feature, allows local users to read arbitrary files via a symlink attack on the ~/.xsession-errors file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0547
https://nvd.nist.gov/vuln/detail/CVE-2003-0547
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0548">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617051" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617051" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0548
https://nvd.nist.gov/vuln/detail/CVE-2003-0548
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0549">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617052" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617052" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:258">RHSA-2003:258</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:259">RHSA-2003:259</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0549
https://nvd.nist.gov/vuln/detail/CVE-2003-0549
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0550">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-06-30T00:00:00</PublicDate>
    <Bugzilla id="1617053" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617053" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows attackers to modify the bridge topology.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0550
https://nvd.nist.gov/vuln/detail/CVE-2003-0550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0551">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-06-30T00:00:00</PublicDate>
    <Bugzilla id="1617054" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617054" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow attackers to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0551
https://nvd.nist.gov/vuln/detail/CVE-2003-0551
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0552">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-06-30T00:00:00</PublicDate>
    <Bugzilla id="1617055" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617055" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0552
https://nvd.nist.gov/vuln/detail/CVE-2003-0552
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0564">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-12-23T00:00:00</PublicDate>
    <Bugzilla id="1617056" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617056" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:112">RHSA-2004:112</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0564
https://nvd.nist.gov/vuln/detail/CVE-2003-0564
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0592">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-03-10T00:00:00</PublicDate>
    <Bugzilla id="1617057" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617057" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror in KDE 3.1.3 and earlier (kdelibs) allows remote attackers to bypass intended cookie access restrictions on a web application via &quot;%2e%2e&quot; (encoded dot dot) directory traversal sequences in a URL, which causes Konqueror to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:074">RHSA-2004:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:074">RHSA-2004:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:074">RHSA-2004:074</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:075">RHSA-2004:075</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:074">RHSA-2004:074</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0592
https://nvd.nist.gov/vuln/detail/CVE-2003-0592
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0594">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-10T00:00:00</PublicDate>
    <Bugzilla id="1617058" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617058" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via &quot;%2e%2e&quot; (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:112">RHSA-2004:112</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0594
https://nvd.nist.gov/vuln/detail/CVE-2003-0594
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0615">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-07-20T00:00:00</PublicDate>
    <Bugzilla id="1617059" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617059" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in start_form() of CGI.pm allows remote attackers to insert web script via a URL that is fed into the form's action parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:256">RHSA-2003:256</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:257">RHSA-2003:257</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0615
https://nvd.nist.gov/vuln/detail/CVE-2003-0615
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0618">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-07-30T00:00:00</PublicDate>
    <Bugzilla id="114923" url="https://bugzilla.redhat.com/show_bug.cgi?id=114923" xml:lang="en:us">
leaks file existance information
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in suidperl 5.6.1 and earlier allow a local user to obtain sensitive information about files for which the user does not have appropriate permissions.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/

This issue does not affect Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0294">RHBA-2006:0294</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0294">RHBA-2006:0294</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0294">RHBA-2006:0294</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0294">RHBA-2006:0294</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0618
https://nvd.nist.gov/vuln/detail/CVE-2003-0618
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0619">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-07-29T00:00:00</PublicDate>
    <Bugzilla id="1617060" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617060" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0619
https://nvd.nist.gov/vuln/detail/CVE-2003-0619
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0644">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-09-07T00:00:00</PublicDate>
    <Bugzilla id="1617061" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617061" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file, which allows local users to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:416">RHSA-2005:416</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:416">RHSA-2005:416</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:416">RHSA-2005:416</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:416">RHSA-2005:416</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0644
https://nvd.nist.gov/vuln/detail/CVE-2003-0644
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0681">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-17T00:00:00</PublicDate>
    <Bugzilla id="1617062" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617062" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A &quot;potential buffer overflow in ruleset parsing&quot; for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0681
https://nvd.nist.gov/vuln/detail/CVE-2003-0681
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0682">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617063" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617063" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
&quot;Memory bugs&quot; in OpenSSH 3.7.1 and earlier, with unknown impact, a different set of vulnerabilities than CVE-2003-0693 and CVE-2003-0695.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.

This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280.

This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch.  The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA.

This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0682
https://nvd.nist.gov/vuln/detail/CVE-2003-0682
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0686">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-08-26T00:00:00</PublicDate>
    <Bugzilla id="1617064" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617064" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in PAM SMB module (pam_smb) 1.1.6 and earlier, when authenticating to a remote service, allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:262">RHSA-2003:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:262">RHSA-2003:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:262">RHSA-2003:262</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:261">RHSA-2003:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:261">RHSA-2003:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:261">RHSA-2003:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:261">RHSA-2003:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:262">RHSA-2003:262</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0686
https://nvd.nist.gov/vuln/detail/CVE-2003-0686
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0688">
    <PublicDate>2003-08-25T00:00:00</PublicDate>
    <Bugzilla id="1617065" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617065" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The DNS map code in Sendmail 8.12.8 and earlier, when using the &quot;enhdnsbl&quot; feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:265">RHSA-2003:265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:265">RHSA-2003:265</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0688
https://nvd.nist.gov/vuln/detail/CVE-2003-0688
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0689">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-04-01T00:00:00</PublicDate>
    <Bugzilla id="1617066" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617066" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:249">RHSA-2003:249</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:249">RHSA-2003:249</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:249">RHSA-2003:249</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:249">RHSA-2003:249</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0689
https://nvd.nist.gov/vuln/detail/CVE-2003-0689
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0690">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617067" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617067" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDM in KDE 3.1.3 and earlier does not verify whether the pam_setcred function call succeeds, which may allow attackers to gain root privileges by triggering error conditions within PAM modules, as demonstrated in certain configurations of the MIT pam_krb5 module.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:286">RHSA-2003:286</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:286">RHSA-2003:286</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:287">RHSA-2003:287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:287">RHSA-2003:287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:288">RHSA-2003:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0690
https://nvd.nist.gov/vuln/detail/CVE-2003-0690
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0692">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617068" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617068" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:269">RHSA-2003:269</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:288">RHSA-2003:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:270">RHSA-2003:270</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0692
https://nvd.nist.gov/vuln/detail/CVE-2003-0692
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0693">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617069" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617069" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A &quot;buffer management error&quot; in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.

This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280.

This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch.  The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA.

This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0693
https://nvd.nist.gov/vuln/detail/CVE-2003-0693
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0694">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-09-17T00:00:00</PublicDate>
    <Bugzilla id="1617070" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617070" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:284">RHSA-2003:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:284">RHSA-2003:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:284">RHSA-2003:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:283">RHSA-2003:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:284">RHSA-2003:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0694
https://nvd.nist.gov/vuln/detail/CVE-2003-0694
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0695">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617071" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617071" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;buffer management errors&quot; in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.

This flaw is fixed in Red Hat Enterprise Linux 2.1 via the errata RHSA-2003:280.

This flaw is fixed in Red Hat Enterprise Linux 3 as a backported patch.  The source RPM contains the patch openssh-3.6.1p2-owl-realloc.diff which resolved this flaw before Red Hat Enterprise Linux 3 GA.

This flaw does not affect any subsequent versions of Red Hat Enterprise Linux.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:279">RHSA-2003:279</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:280">RHSA-2003:280</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0695
https://nvd.nist.gov/vuln/detail/CVE-2003-0695
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0699">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-08-21T00:00:00</PublicDate>
    <Bugzilla id="1617072" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617072" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The C-Media PCI sound driver in Linux before 2.4.21 does not use the get_user function to access userspace, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0700.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:239">RHSA-2003:239</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:198">RHSA-2003:198</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0699
https://nvd.nist.gov/vuln/detail/CVE-2003-0699
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0700">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617073" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617073" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The C-Media PCI sound driver in Linux before 2.4.22 does not use the get_user function to access userspace in certain conditions, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0699.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:238">RHSA-2003:238</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0700
https://nvd.nist.gov/vuln/detail/CVE-2003-0700
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0720">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-10T00:00:00</PublicDate>
    <Bugzilla id="1617074" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617074" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0720
https://nvd.nist.gov/vuln/detail/CVE-2003-0720
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0721">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-10T00:00:00</PublicDate>
    <Bugzilla id="1617075" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617075" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:273">RHSA-2003:273</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:274">RHSA-2003:274</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0721
https://nvd.nist.gov/vuln/detail/CVE-2003-0721
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0730">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-08-30T00:00:00</PublicDate>
    <Bugzilla id="1617076" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617076" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the font libraries for XFree86 4.3.0 allow local or remote attackers to cause a denial of service or execute arbitrary code via heap-based and stack-based buffer overflow attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:286">RHSA-2003:286</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:286">RHSA-2003:286</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:287">RHSA-2003:287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:287">RHSA-2003:287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:288">RHSA-2003:288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:289">RHSA-2003:289</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0730
https://nvd.nist.gov/vuln/detail/CVE-2003-0730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0740">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-03T00:00:00</PublicDate>
    <Bugzilla id="1617077" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617077" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stunnel 4.00, and 3.24 and earlier, leaks a privileged file descriptor returned by listen(), which allows local users to hijack the Stunnel server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:297">RHSA-2003:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:297">RHSA-2003:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:297">RHSA-2003:297</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:296">RHSA-2003:296</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:297">RHSA-2003:297</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0740
https://nvd.nist.gov/vuln/detail/CVE-2003-0740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0773">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617078" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617078" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier does not check the IP address of the connecting host during the SANE_NET_INIT RPC call, which allows remote attackers to use that call even if they are restricted in saned.conf.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0773
https://nvd.nist.gov/vuln/detail/CVE-2003-0773
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0774">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617079" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617079" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier does not quickly handle connection drops, which allows remote attackers to cause a denial of service (segmentation fault) when invalid memory is accessed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0774
https://nvd.nist.gov/vuln/detail/CVE-2003-0774
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0775">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617080" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617080" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote attackers to cause a denial of service (memory consumption or crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0775
https://nvd.nist.gov/vuln/detail/CVE-2003-0775
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0776">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617081" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617081" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier does not properly &quot;check the validity of the RPC numbers it gets before getting the parameters,&quot; with unknown consequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0776
https://nvd.nist.gov/vuln/detail/CVE-2003-0776
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0777">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617082" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617082" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier, when debug messages are enabled, does not properly handle dropped connections, which can prevent strings from being null terminated and cause a denial of service (segmentation fault).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0777
https://nvd.nist.gov/vuln/detail/CVE-2003-0777
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0778">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617083" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617083" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
saned in sane-backends 1.0.7 and earlier, and possibly later versions, does not properly allocate memory in certain cases, which could allow attackers to cause a denial of service (memory consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:278">RHSA-2003:278</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:285">RHSA-2003:285</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0778
https://nvd.nist.gov/vuln/detail/CVE-2003-0778
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0780">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-10T00:00:00</PublicDate>
    <Bugzilla id="1617084" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617084" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:282">RHSA-2003:282</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:282">RHSA-2003:282</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:282">RHSA-2003:282</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:281">RHSA-2003:281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:281">RHSA-2003:281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:281">RHSA-2003:281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:281">RHSA-2003:281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:281">RHSA-2003:281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:282">RHSA-2003:282</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0780
https://nvd.nist.gov/vuln/detail/CVE-2003-0780
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0787">
    <Details source="Mitre" xml:lang="en:us">
The PAM conversation function in OpenSSH 3.7.1 and 3.7.1p1 interprets an array of structures as an array of pointers, which allows attackers to modify the stack and possibly gain privileges.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the version of openssh as shipped with Red Hat Enterprise Linux 3 as it did not include the upstream PAM password authentication module reimplementation, introduced in OpenSSH 3.7. This issue did not affect the versions of openssh as shipped with Red Hat Enterprise Linux 4, 5, and 6.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0787
https://nvd.nist.gov/vuln/detail/CVE-2003-0787
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0788">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617085" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617085" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the Internet Printing Protocol (IPP) implementation in CUPS before 1.1.19 allows remote attackers to cause a denial of service (CPU consumption from a &quot;busy loop&quot;) via certain inputs to the IPP port (TCP 631).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:275">RHSA-2003:275</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:275">RHSA-2003:275</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0788
https://nvd.nist.gov/vuln/detail/CVE-2003-0788
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0789">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-28T00:00:00</PublicDate>
    <Bugzilla id="1617086" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617086" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_cgid in Apache before 2.0.48, when using a threaded MPM, does not properly handle CGI redirect paths, which could cause Apache to send the output of a CGI program to the wrong client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:320">RHSA-2003:320</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:320">RHSA-2003:320</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0789
https://nvd.nist.gov/vuln/detail/CVE-2003-0789
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0792">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-16T00:00:00</PublicDate>
    <Bugzilla id="1617087" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617087" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Fetchmail 6.2.4 and earlier does not properly allocate memory for long lines, which allows remote attackers to cause a denial of service (crash) via a certain email.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0792
https://nvd.nist.gov/vuln/detail/CVE-2003-0792
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0795">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617088" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617088" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:305">RHSA-2003:305</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:305">RHSA-2003:305</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0795
https://nvd.nist.gov/vuln/detail/CVE-2003-0795
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0845">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-05T00:00:00</PublicDate>
    <Bugzilla id="409891" url="https://bugzilla.redhat.com/show_bug.cgi?id=409891" xml:lang="en:us">
JBoss HSQLDB component remote command injection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the HSQLDB component in JBoss 3.2.1 and 3.0.8 on Java 1.4.x platforms, when running in the default configuration, allows remote attackers to conduct unauthorized activities and possibly execute arbitrary code via certain SQL statements to (1) TCP port 1701 in JBoss 3.2.1, and (2) port 1476 in JBoss 3.0.8.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1048">RHSA-2007:1048</Advisory>
        <Package name="hsqldb">hsqldb-1:1.8.0.4-3jpp.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1048">RHSA-2007:1048</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.25</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0845
https://nvd.nist.gov/vuln/detail/CVE-2003-0845
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0848">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-06T00:00:00</PublicDate>
    <Bugzilla id="1617089" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617089" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative &quot;pathlen&quot; value to be used.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:041">RHSA-2004:041</Advisory>
        <Package name="slocate">slocate-0:2.7-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:040">RHSA-2004:040</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0848
https://nvd.nist.gov/vuln/detail/CVE-2003-0848
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0851">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-11-04T00:00:00</PublicDate>
    <Bugzilla id="1617090" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617090" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recursion) via malformed ASN.1 sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:139">RHSA-2004:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0851
https://nvd.nist.gov/vuln/detail/CVE-2003-0851
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0853">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617091" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617091" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0853
https://nvd.nist.gov/vuln/detail/CVE-2003-0853
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0854">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617092" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617092" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:309">RHSA-2003:309</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:310">RHSA-2003:310</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0854
https://nvd.nist.gov/vuln/detail/CVE-2003-0854
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0855">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-25T00:00:00</PublicDate>
    <Bugzilla id="1617093" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617093" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Pan 0.13.3 and earlier allows remote attackers to cause a denial of service (crash) via a news post with a long author email address.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:312">RHSA-2003:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:312">RHSA-2003:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:312">RHSA-2003:312</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:311">RHSA-2003:311</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:311">RHSA-2003:311</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:311">RHSA-2003:311</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:311">RHSA-2003:311</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:311">RHSA-2003:311</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:312">RHSA-2003:312</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0855
https://nvd.nist.gov/vuln/detail/CVE-2003-0855
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0856">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617095" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617095" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:317">RHSA-2003:317</Advisory>
        <Package name="iproute">iproute-0:2.4.7-11.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:316">RHSA-2003:316</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:316">RHSA-2003:316</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:316">RHSA-2003:316</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:316">RHSA-2003:316</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:316">RHSA-2003:316</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0856
https://nvd.nist.gov/vuln/detail/CVE-2003-0856
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0857">
    <Details source="Mitre" xml:lang="en:us">
The (1) ipq_read and (2) ipulog_read functions in iptables allow local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
    </Details>
    <Statement xml:lang="en:us">
Not affected.  Red Hat did not ship iptables-devel or anything else that used these vulnerable functions with Red Hat Enterprise Linux 2.1 or 3.  Red Hat Enterprise Linux 4 and 5 contained a backported patch to correct this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0857
https://nvd.nist.gov/vuln/detail/CVE-2003-0857
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0858">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617096" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617096" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Zebra 0.93b and earlier, and quagga before 0.95, allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:315">RHSA-2003:315</Advisory>
        <Package name="quagga">quagga-0:0.96.2-8.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:305">RHSA-2003:305</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:307">RHSA-2003:307</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:305">RHSA-2003:305</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0858
https://nvd.nist.gov/vuln/detail/CVE-2003-0858
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0859">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617097" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617097" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:334">RHSA-2003:334</Advisory>
        <Package name="glibc">glibc-0:2.3.2-95.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:325">RHSA-2003:325</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0859
https://nvd.nist.gov/vuln/detail/CVE-2003-0859
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0860">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in PHP before 4.3.3 have unknown impact and unknown attack vectors.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0860
https://nvd.nist.gov/vuln/detail/CVE-2003-0860
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0861">
    <Details source="Mitre" xml:lang="en:us">
Integer overflows in (1) base64_encode and (2) the GD library for PHP before 4.3.3 have unknown impact and unknown attack vectors.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0861
https://nvd.nist.gov/vuln/detail/CVE-2003-0861
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0863">
    <Details source="Mitre" xml:lang="en:us">
The php_check_safe_mode_include_dir function in fopen_wrappers.c of PHP 4.3.x returns a success value (0) when the safe_mode_include_dir variable is not specified in configuration, which differs from the previous failure value and may allow remote attackers to exploit file include vulnerabilities in PHP applications.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1.  The PHP packages in Red Hat Enterprise Linux 3 contain a backported patch to address this issue since release.

The issue was fixed upstream in PHP 4.3.3.  The PHP packages in Red Hat Enterprise Linux 4 and 5 are based on fixed upstream versions.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0863
https://nvd.nist.gov/vuln/detail/CVE-2003-0863
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0885">
    <Details source="Mitre" xml:lang="en:us">
Xscreensaver 4.14 contains certain debugging code that should have been omitted, which causes Xscreensaver to create temporary files insecurely in the (1) apple2, (2) xanalogtv, and (3) pong screensavers, and allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of Xscreensaver as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0885
https://nvd.nist.gov/vuln/detail/CVE-2003-0885
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0901">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-08-24T00:00:00</PublicDate>
    <Bugzilla id="1617098" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617098" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in to_ascii for PostgreSQL 7.2.x, and 7.3.x before 7.3.4, allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:314">RHSA-2003:314</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:314">RHSA-2003:314</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:314">RHSA-2003:314</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:313">RHSA-2003:313</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:313">RHSA-2003:313</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:313">RHSA-2003:313</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:313">RHSA-2003:313</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:314">RHSA-2003:314</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0901
https://nvd.nist.gov/vuln/detail/CVE-2003-0901
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0924">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-18T00:00:00</PublicDate>
    <Bugzilla id="1617099" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617099" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
netpbm 9.25 and earlier does not properly create temporary files, which allows local users to overwrite arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:031">RHSA-2004:031</Advisory>
        <Package name="netpbm">netpbm-0:9.24-11.30.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:030">RHSA-2004:030</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0924
https://nvd.nist.gov/vuln/detail/CVE-2003-0924
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0925">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617100" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617100" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:324">RHSA-2003:324</Advisory>
        <Package name="ethereal">ethereal-0:0.9.16-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0925
https://nvd.nist.gov/vuln/detail/CVE-2003-0925
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0926">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617101" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617101" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:324">RHSA-2003:324</Advisory>
        <Package name="ethereal">ethereal-0:0.9.16-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0926
https://nvd.nist.gov/vuln/detail/CVE-2003-0926
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0927">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617102" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617102" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the SOCKS dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:324">RHSA-2003:324</Advisory>
        <Package name="ethereal">ethereal-0:0.9.16-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:323">RHSA-2003:323</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0927
https://nvd.nist.gov/vuln/detail/CVE-2003-0927
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0935">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-09-06T00:00:00</PublicDate>
    <Bugzilla id="1617103" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617103" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Net-SNMP before 5.0.9 allows a user or community to access data in MIB objects, even if that data is not allowed to be viewed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:023">RHSA-2004:023</Advisory>
        <Package name="net-snmp">net-snmp-0:5.0.9-2.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:335">RHSA-2003:335</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:335">RHSA-2003:335</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0935
https://nvd.nist.gov/vuln/detail/CVE-2003-0935
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0961">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-12-01T00:00:00</PublicDate>
    <Bugzilla id="1617104" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617104" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:368">RHSA-2003:368</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-12-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:389">RHSA-2003:389</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2003:308">RHBA-2003:308</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-12-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:389">RHSA-2003:389</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-12-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:389">RHSA-2003:389</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2003:308">RHBA-2003:308</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:392">RHSA-2003:392</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:392">RHSA-2003:392</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:392">RHSA-2003:392</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:392">RHSA-2003:392</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:392">RHSA-2003:392</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:368">RHSA-2003:368</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0961
https://nvd.nist.gov/vuln/detail/CVE-2003-0961
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0962">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2003-12-04T00:00:00</PublicDate>
    <Bugzilla id="1617105" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617105" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the rsync team for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:399">RHSA-2003:399</Advisory>
        <Package name="rsync">rsync-0:2.5.7-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:398">RHSA-2003:398</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:398">RHSA-2003:398</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:398">RHSA-2003:398</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:398">RHSA-2003:398</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:398">RHSA-2003:398</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0962
https://nvd.nist.gov/vuln/detail/CVE-2003-0962
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0963">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-12-13T00:00:00</PublicDate>
    <Bugzilla id="1617106" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617106" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflows in (1) try_netscape_proxy and (2) try_squid_eplf for lftp 2.6.9 and earlier allow remote HTTP servers to execute arbitrary code via long directory names that are processed by the ls or rels commands.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ulf Härnhammar for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:404">RHSA-2003:404</Advisory>
        <Package name="lftp">lftp-0:2.6.3-5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:403">RHSA-2003:403</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:403">RHSA-2003:403</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:403">RHSA-2003:403</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:403">RHSA-2003:403</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0963
https://nvd.nist.gov/vuln/detail/CVE-2003-0963
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0965">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-12-31T00:00:00</PublicDate>
    <Bugzilla id="1617107" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617107" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the admin CGI script for Mailman before 2.1.4 allows remote attackers to steal session cookies and conduct unauthorized activities.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:020">RHSA-2004:020</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0965
https://nvd.nist.gov/vuln/detail/CVE-2003-0965
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0966">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617108" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617108" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the frm command in elm 2.5.6 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code via a long Subject line.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:009">RHSA-2004:009</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:009">RHSA-2004:009</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0966
https://nvd.nist.gov/vuln/detail/CVE-2003-0966
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0967">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-11-20T00:00:00</PublicDate>
    <Bugzilla id="1617109" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617109" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADIUS string attribute with a tag, which causes memcpy to be called with a -1 length argument, as demonstrated using the Tunnel-Password attribute.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:386">RHSA-2003:386</Advisory>
        <Package name="freeradius">freeradius-0:0.9.3-1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0967
https://nvd.nist.gov/vuln/detail/CVE-2003-0967
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0971">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-11-27T00:00:00</PublicDate>
    <Bugzilla id="1617110" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617110" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:395">RHSA-2003:395</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:390">RHSA-2003:390</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:390">RHSA-2003:390</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:390">RHSA-2003:390</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:390">RHSA-2003:390</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2003-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:390">RHSA-2003:390</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0971
https://nvd.nist.gov/vuln/detail/CVE-2003-0971
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0972">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-27T00:00:00</PublicDate>
    <Bugzilla id="1617111" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617111" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in ansi.c for GNU screen 4.0.1 and earlier, and 3.9.15 and earlier, allows local users to execute arbitrary code via a large number of &quot;;&quot; (semicolon) characters in escape sequences, which leads to a buffer overflow.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0972
https://nvd.nist.gov/vuln/detail/CVE-2003-0972
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0973">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-28T00:00:00</PublicDate>
    <Bugzilla id="1617112" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617112" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in mod_python 3.0.x before 3.0.4, and 2.7.x before 2.7.9, allows remote attackers to cause a denial of service (httpd crash) via a certain query string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:058">RHSA-2004:058</Advisory>
        <Package name="mod_python">mod_python-0:3.0.3-3.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:063">RHSA-2004:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0973
https://nvd.nist.gov/vuln/detail/CVE-2003-0973
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0977">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-12-17T00:00:00</PublicDate>
    <Bugzilla id="1617113" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617113" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:004">RHSA-2004:004</Advisory>
        <Package name="cvs">cvs-0:1.11.2-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:003">RHSA-2004:003</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0977
https://nvd.nist.gov/vuln/detail/CVE-2003-0977
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0984">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-12-04T00:00:00</PublicDate>
    <Bugzilla id="1617114" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617114" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0984
https://nvd.nist.gov/vuln/detail/CVE-2003-0984
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0985">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-01-05T00:00:00</PublicDate>
    <Bugzilla id="1617115" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617115" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Andrea Arcangeli, Paul Starzetz (ISEC), and Solar Designer for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:416">RHSA-2003:416</Advisory>
        <Package name="kernel">kernel-0:2.4.21-4.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:418">RHSA-2003:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:419">RHSA-2003:419</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:419">RHSA-2003:419</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:419">RHSA-2003:419</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.1">
        <ProductName>Red Hat Linux 7.1</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.2">
        <ProductName>Red Hat Linux 7.2</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:7.3">
        <ProductName>Red Hat Linux 7.3</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:8.0">
        <ProductName>Red Hat Linux 8.0</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:417">RHSA-2003:417</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:418">RHSA-2003:418</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0985
https://nvd.nist.gov/vuln/detail/CVE-2003-0985
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0986">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617116" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617116" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:017">RHSA-2004:017</Advisory>
        <Package name="kernel">kernel-0:2.4.21-9.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0986
https://nvd.nist.gov/vuln/detail/CVE-2003-0986
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0987">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-12-18T00:00:00</PublicDate>
    <Bugzilla id="430529" url="https://bugzilla.redhat.com/show_bug.cgi?id=430529" xml:lang="en:us">
httpd mod_digest nonce not verified
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:653">RHSA-2004:653</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0987
https://nvd.nist.gov/vuln/detail/CVE-2003-0987
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0988">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617117" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617117" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the VCF file information reader for KDE Personal Information Management (kdepim) suite in KDE 3.1.0 through 3.1.4 allows attackers to execute arbitrary code via a VCF file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:005">RHSA-2004:005</Advisory>
        <Package name="kdepim">kdepim-6:3.1.3-3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:006">RHSA-2004:006</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0988
https://nvd.nist.gov/vuln/detail/CVE-2003-0988
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0989">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617118" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617118" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
tcpdump before 3.8.1 allows remote attackers to cause a denial of service (infinite loop) via certain ISAKMP packets, a different vulnerability than CVE-2004-0057.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.6.2-12.2.1AS.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:007">RHSA-2004:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0989
https://nvd.nist.gov/vuln/detail/CVE-2003-0989
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0991">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-09T00:00:00</PublicDate>
    <Bugzilla id="1617119" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617119" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:019">RHSA-2004:019</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:019">RHSA-2004:019</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:019">RHSA-2004:019</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0991
https://nvd.nist.gov/vuln/detail/CVE-2003-0991
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-0992">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-09-29T00:00:00</PublicDate>
    <Bugzilla id="1617120" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617120" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the create CGI script for Mailman before 2.1.3 allows remote attackers to steal cookies of other users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:020">RHSA-2004:020</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-0992
https://nvd.nist.gov/vuln/detail/CVE-2003-0992
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1012">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-12-12T00:00:00</PublicDate>
    <Bugzilla id="1617121" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617121" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:002">RHSA-2004:002</Advisory>
        <Package name="ethereal">ethereal-0:0.10.0a-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:001">RHSA-2004:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1012
https://nvd.nist.gov/vuln/detail/CVE-2003-1012
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1013">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-12-12T00:00:00</PublicDate>
    <Bugzilla id="1617122" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617122" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Q.931 dissector in Ethereal before 0.10.0, and Tethereal, allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:002">RHSA-2004:002</Advisory>
        <Package name="ethereal">ethereal-0:0.10.0a-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:001">RHSA-2004:001</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1013
https://nvd.nist.gov/vuln/detail/CVE-2003-1013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1023">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-01-16T00:00:00</PublicDate>
    <Bugzilla id="1617123" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617123" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:035">RHSA-2004:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:035">RHSA-2004:035</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:034">RHSA-2004:034</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:035">RHSA-2004:035</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1023
https://nvd.nist.gov/vuln/detail/CVE-2003-1023
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1040">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-12-04T00:00:00</PublicDate>
    <Bugzilla id="1617124" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617124" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of service (crash) by sending certain signals to kmod.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:065">RHSA-2004:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1040
https://nvd.nist.gov/vuln/detail/CVE-2003-1040
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1138">
    <Details source="Mitre" xml:lang="en:us">
The default configuration of Apache 2.0.40, as shipped with Red Hat Linux 9.0, allows remote attackers to list directory contents, even if auto indexing is turned off and there is a default web page configured, via a GET request containing a double slash (//).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1138
https://nvd.nist.gov/vuln/detail/CVE-2003-1138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1294">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-11-28T00:00:00</PublicDate>
    <Bugzilla id="1617125" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617125" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Xscreensaver before 4.15 creates temporary files insecurely in (1) driver/passwd-kerberos.c, (2) driver/xscreensaver-getimage-video, (3) driver/xscreensaver.kss.in, and the (4) vidwhacker and (5) webcollage screensavers, which allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0498">RHSA-2006:0498</Advisory>
        <Package name="xscreensaver">xscreensaver-1:4.10-20</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1294
https://nvd.nist.gov/vuln/detail/CVE-2003-1294
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1302">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-04T00:00:00</PublicDate>
    <Bugzilla id="1617126" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617126" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of &quot;\&quot; (backslash) characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1302
https://nvd.nist.gov/vuln/detail/CVE-2003-1302
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1303">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-06-12T00:00:00</PublicDate>
    <Bugzilla id="1617127" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617127" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the imap_fetch_overview function in the IMAP functionality (php_imap.c) in PHP before 4.3.3 allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long e-mail address in a (1) To or (2) From header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1303
https://nvd.nist.gov/vuln/detail/CVE-2003-1303
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1307">
    <Details source="Mitre" xml:lang="en:us">
The mod_php module for the Apache HTTP Server allows local users with write access to PHP scripts to send signals to the server's process group and use the server's file descriptors, as demonstrated by sending a STOP signal, then intercepting incoming connections on the server's TCP port.  NOTE: the PHP developer has disputed this vulnerability, saying &quot;The opened file descriptors are opened by Apache. It is the job of Apache to protect them ... Not a bug in PHP.
    </Details>
    <Statement xml:lang="en:us">
This is not a vulnerability.  When PHP scripts are interpreted using the dynamically loaded mod_php DSO, the PHP interpreter executes with the privileges of the httpd child process. The PHP intepreter does not &quot;sandbox&quot; PHP scripts from the environment in which they run.

On any modern Unix system a process can easily obtain access to all the parent file descriptors anyway, even if they have been closed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1307
https://nvd.nist.gov/vuln/detail/CVE-2003-1307
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1308">
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in fvwm-menu-directory for fvwm 2.5.x before 2.5.10 and 2.4.x before 2.4.18 allows local users to execute arbitrary commands via carriage returns in a filename.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with fvwm, however this issue does not affect the included version of fvwm.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1308
https://nvd.nist.gov/vuln/detail/CVE-2003-1308
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1329">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-01-29T00:00:00</PublicDate>
    <Bugzilla id="1617128" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617128" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ftpd.c in wu-ftpd 2.6.2, when running on &quot;operating systems that only allow one non-connected socket bound to the same local address,&quot; does not close failed connections, which allows remote attackers to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1329
https://nvd.nist.gov/vuln/detail/CVE-2003-1329
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1331">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed. The user must voluntarily interact with the attack mechanism to exploit this flaw, with the result being the ability to run code as themselves.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1331
https://nvd.nist.gov/vuln/detail/CVE-2003-1331
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1418">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-02-25T00:00:00</PublicDate>
    <Bugzilla id="733043" url="https://bugzilla.redhat.com/show_bug.cgi?id=733043" xml:lang="en:us">
httpd information disclosure in FileEtag
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1418
https://nvd.nist.gov/vuln/detail/CVE-2003-1418
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1557">
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in spamc of SpamAssassin 2.40 through 2.43, when using BSMTP mode (&quot;-B&quot;), allows remote attackers to execute arbitrary code via email containing headers with leading &quot;.&quot; characters.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of SpamAssassin as shipped with Red Hat Enterprise Linux 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1557
https://nvd.nist.gov/vuln/detail/CVE-2003-1557
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1562">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-05-01T00:00:00</PublicDate>
    <Bugzilla id="457820" url="https://bugzilla.redhat.com/show_bug.cgi?id=457820" xml:lang="en:us">
openssh information disclosure
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use timing differences to determine if the password step of a multi-step authentication is successful, a different vulnerability than CVE-2003-0190.
    </Details>
    <Statement xml:lang="en:us">
The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which is in maintenance mode.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1562
https://nvd.nist.gov/vuln/detail/CVE-2003-1562
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1564">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-02-02T00:00:00</PublicDate>
    <Bugzilla id="461107" url="https://bugzilla.redhat.com/show_bug.cgi?id=461107" xml:lang="en:us">
libxml2: billion laughs DoS attack
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libxml2, possibly before 2.5.0, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, aka the &quot;billion laughs attack.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-09-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0886">RHSA-2008:0886</Advisory>
        <Package name="libxml2">libxml2-0:2.4.19-11.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1564
https://nvd.nist.gov/vuln/detail/CVE-2003-1564
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1581">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-03-04T00:00:00</PublicDate>
    <Bugzilla id="562414" url="https://bugzilla.redhat.com/show_bug.cgi?id=562414" xml:lang="en:us">
httpd: Injection of arbitrary text into log files when DNS resolution is enabled
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The Apache HTTP Server 2.0.44, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an &quot;Inverse Lookup Log Corruption (ILLC)&quot; issue.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1581
https://nvd.nist.gov/vuln/detail/CVE-2003-1581
    </References>
</Vulnerability>

<Vulnerability name="CVE-2003-1604">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2003-10-20T00:00:00</PublicDate>
    <Bugzilla id="1303072" url="https://bugzilla.redhat.com/show_bug.cgi?id=1303072" xml:lang="en:us">
kernel: Missing NULL pointer check in nf_nat_redirect_ipv4
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>5.4</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:N/A:C</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
The redirect_target function in net/ipv4/netfilter/ipt_REDIRECT.c in the Linux kernel before 2.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending packets to an interface that has a 0.0.0.0 IP address, a related issue to CVE-2015-8787.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_mrg:2">
        <ProductName>Red Hat Enterprise MRG 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>realtime-kernel</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2003-1604
https://nvd.nist.gov/vuln/detail/CVE-2003-1604
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0001">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-13T00:00:00</PublicDate>
    <Bugzilla id="1617129" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617129" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:017">RHSA-2004:017</Advisory>
        <Package name="kernel">kernel-0:2.4.21-9.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0001
https://nvd.nist.gov/vuln/detail/CVE-2004-0001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0003">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-16T00:00:00</PublicDate>
    <Bugzilla id="1617130" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617130" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to &quot;R128 DRI limits checking.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:044">RHSA-2004:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:065">RHSA-2004:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:166">RHSA-2004:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0003
https://nvd.nist.gov/vuln/detail/CVE-2004-0003
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0006">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-26T00:00:00</PublicDate>
    <Bugzilla id="1617131" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617131" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Jacques A. Vidrine and Steffan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:032">RHSA-2004:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0006
https://nvd.nist.gov/vuln/detail/CVE-2004-0006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0007">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-26T00:00:00</PublicDate>
    <Bugzilla id="1617132" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617132" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Jacques A. Vidrine and Steffan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:032">RHSA-2004:032</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0007
https://nvd.nist.gov/vuln/detail/CVE-2004-0007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0008">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-01-26T00:00:00</PublicDate>
    <Bugzilla id="1617133" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617133" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Jacques A. Vidrine and Steffan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:032">RHSA-2004:032</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:045">RHSA-2004:045</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0008
https://nvd.nist.gov/vuln/detail/CVE-2004-0008
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0010">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617134" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617134" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:188">RHSA-2004:188</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:065">RHSA-2004:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0010
https://nvd.nist.gov/vuln/detail/CVE-2004-0010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0055">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617135" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617135" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The print_attr_string function in print-radius.c for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via a RADIUS attribute with a large length value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.6.2-12.2.1AS.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:007">RHSA-2004:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0055
https://nvd.nist.gov/vuln/detail/CVE-2004-0055
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0057">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617136" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617136" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The rawprint function in the ISAKMP decoding routines (print-isakmp.c) for tcpdump 3.8.1 and earlier allows remote attackers to cause a denial of service (segmentation fault) via malformed ISAKMP packets that cause invalid &quot;len&quot; or &quot;loc&quot; values to be used in a loop, a different vulnerability than CVE-2003-0989.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.6.2-12.2.1AS.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:008">RHSA-2004:008</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-01-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:007">RHSA-2004:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0057
https://nvd.nist.gov/vuln/detail/CVE-2004-0057
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0075">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617137" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617137" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:065">RHSA-2004:065</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0075
https://nvd.nist.gov/vuln/detail/CVE-2004-0075
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0077">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617138" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617138" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Paul Starzetz (ISEC) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:066">RHSA-2004:066</Advisory>
        <Package name="kernel">kernel-0:2.4.21-9.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:066">RHSA-2004:066</Advisory>
        <Package name="s390utils">s390utils-2:1.2.4-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:069">RHSA-2004:069</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:065">RHSA-2004:065</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0077
https://nvd.nist.gov/vuln/detail/CVE-2004-0077
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0078">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-11T00:00:00</PublicDate>
    <Bugzilla id="1617139" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617139" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the index menu code (menu_pad_string of menu.c) for Mutt 1.4.1 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain mail messages.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Niels Heinen for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:050">RHSA-2004:050</Advisory>
        <Package name="mutt">mutt-5:1.4.1-3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:051">RHSA-2004:051</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0078
https://nvd.nist.gov/vuln/detail/CVE-2004-0078
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0079">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-03-17T00:00:00</PublicDate>
    <Bugzilla id="1617140" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617140" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:830">RHSA-2005:830</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.42</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:830">RHSA-2005:830</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.42</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:829">RHSA-2005:829</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:829">RHSA-2005:829</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:829">RHSA-2005:829</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:121">RHSA-2004:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:829">RHSA-2005:829</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:139">RHSA-2004:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0079
https://nvd.nist.gov/vuln/detail/CVE-2004-0079
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0080">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-02-03T00:00:00</PublicDate>
    <Bugzilla id="1617141" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617141" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The login program in util-linux 2.11 and earlier uses a pointer after it has been freed and reallocated, which could cause login to leak sensitive data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:056">RHSA-2004:056</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:056">RHSA-2004:056</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:056">RHSA-2004:056</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:056">RHSA-2004:056</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0080
https://nvd.nist.gov/vuln/detail/CVE-2004-0080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0081">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-17T00:00:00</PublicDate>
    <Bugzilla id="1617142" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617142" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:121">RHSA-2004:121</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:119">RHSA-2004:119</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:139">RHSA-2004:139</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0081
https://nvd.nist.gov/vuln/detail/CVE-2004-0081
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0082">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-13T00:00:00</PublicDate>
    <Bugzilla id="1617143" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617143" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the Samba team for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:064">RHSA-2004:064</Advisory>
        <Package name="samba">samba-0:3.0.2-6.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0082
https://nvd.nist.gov/vuln/detail/CVE-2004-0082
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0083">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-08T00:00:00</PublicDate>
    <Bugzilla id="1617144" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617144" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ReadFontAlias from dirfile.c of XFree86 4.1.0 through 4.3.0 allows local users and remote attackers to execute arbitrary code via a font alias file (font.alias) with a long token, a different vulnerability than CVE-2004-0084 and CVE-2004-0106.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank David Dawes (XFree86) and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:061">RHSA-2004:061</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-55.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:059">RHSA-2004:059</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0083
https://nvd.nist.gov/vuln/detail/CVE-2004-0083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0084">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-12T00:00:00</PublicDate>
    <Bugzilla id="1617145" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617145" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, allows local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias (font.alias) file, a different vulnerability than CVE-2004-0083 and CVE-2004-0106.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank David Dawes (XFree86) and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:061">RHSA-2004:061</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-55.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:059">RHSA-2004:059</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0084
https://nvd.nist.gov/vuln/detail/CVE-2004-0084
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0093">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-19T00:00:00</PublicDate>
    <Bugzilla id="1617146" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617146" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
XFree86 4.1.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an out-of-bounds array index when using the GLX extension and Direct Rendering Infrastructure (DRI).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0093
https://nvd.nist.gov/vuln/detail/CVE-2004-0093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0094">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-19T00:00:00</PublicDate>
    <Bugzilla id="1617147" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617147" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness errors in XFree86 4.1.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code when using the GLX extension and Direct Rendering Infrastructure (DRI).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:152">RHSA-2004:152</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0094
https://nvd.nist.gov/vuln/detail/CVE-2004-0094
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0096">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-22T00:00:00</PublicDate>
    <Bugzilla id="430510" url="https://bugzilla.redhat.com/show_bug.cgi?id=430510" xml:lang="en:us">
mod_python remote DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in mod_python 2.7.9 allows remote attackers to cause a denial of service (httpd crash) via a certain query string, a variant of CAN-2003-0973.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:058">RHSA-2004:058</Advisory>
        <Package name="mod_python">mod_python-0:3.0.3-3.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:063">RHSA-2004:063</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0096
https://nvd.nist.gov/vuln/detail/CVE-2004-0096
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0097">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-21T00:00:00</PublicDate>
    <Bugzilla id="1617148" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617148" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Craig Southeren (the OpenH323 project) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:047">RHSA-2004:047</Advisory>
        <Package name="pwlib">pwlib-0:1.4.7-7.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:048">RHSA-2004:048</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0097
https://nvd.nist.gov/vuln/detail/CVE-2004-0097
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0104">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617149" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617149" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0104
https://nvd.nist.gov/vuln/detail/CVE-2004-0104
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0105">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617150" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617150" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:073">RHSA-2004:073</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0105
https://nvd.nist.gov/vuln/detail/CVE-2004-0105
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0106">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-02-13T00:00:00</PublicDate>
    <Bugzilla id="1617151" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617151" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in XFree86 4.1.0 to 4.3.0, related to improper handling of font files, a different set of vulnerabilities than CVE-2004-0083 and CVE-2004-0084.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank David Dawes (XFree86) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:061">RHSA-2004:061</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-55.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:059">RHSA-2004:059</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:060">RHSA-2004:060</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0106
https://nvd.nist.gov/vuln/detail/CVE-2004-0106
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0107">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-10T00:00:00</PublicDate>
    <Bugzilla id="1617152" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617152" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) post and (2) trigger scripts in sysstat 4.0.7 and earlier allow local users to overwrite arbitrary files via symlink attacks on temporary files, a different vulnerability than CVE-2004-0108.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:053">RHSA-2004:053</Advisory>
        <Package name="sysstat">sysstat-0:4.0.7-4.EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:093">RHSA-2004:093</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0107
https://nvd.nist.gov/vuln/detail/CVE-2004-0107
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0108">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-10T00:00:00</PublicDate>
    <Bugzilla id="1617153" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617153" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:053">RHSA-2004:053</Advisory>
        <Package name="sysstat">sysstat-0:4.0.7-4.EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0108
https://nvd.nist.gov/vuln/detail/CVE-2004-0108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0109">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617154" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617154" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:183">RHSA-2004:183</Advisory>
        <Package name="kernel">kernel-0:2.4.21-9.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:105">RHSA-2004:105</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:105">RHSA-2004:105</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:105">RHSA-2004:105</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:166">RHSA-2004:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:106">RHSA-2004:106</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0109
https://nvd.nist.gov/vuln/detail/CVE-2004-0109
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0110">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-02-12T00:00:00</PublicDate>
    <Bugzilla id="430644" url="https://bugzilla.redhat.com/show_bug.cgi?id=430644" xml:lang="en:us">
libxml2 long URL causes SEGV
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:090">RHSA-2004:090</Advisory>
        <Package name="libxml2">libxml2-0:2.5.10-6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:650">RHSA-2004:650</Advisory>
        <Package name="libxml">libxml-1:1.8.17-9.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:091">RHSA-2004:091</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0110
https://nvd.nist.gov/vuln/detail/CVE-2004-0110
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0111">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-03-10T00:00:00</PublicDate>
    <Bugzilla id="1617155" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617155" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:103">RHSA-2004:103</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-6.1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:102">RHSA-2004:102</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0111
https://nvd.nist.gov/vuln/detail/CVE-2004-0111
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0112">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-17T00:00:00</PublicDate>
    <Bugzilla id="1617156" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617156" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:120">RHSA-2004:120</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:121">RHSA-2004:121</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0112
https://nvd.nist.gov/vuln/detail/CVE-2004-0112
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0113">
    <PublicDate>2004-02-20T00:00:00</PublicDate>
    <Bugzilla id="1617157" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617157" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:084">RHSA-2004:084</Advisory>
        <Package name="httpd">httpd-0:2.0.46-32.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:182">RHSA-2004:182</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0113
https://nvd.nist.gov/vuln/detail/CVE-2004-0113
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0136">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617158" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617158" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a &quot;corrupted binary.&quot;
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0136
https://nvd.nist.gov/vuln/detail/CVE-2004-0136
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0138">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617159" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617159" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0138
https://nvd.nist.gov/vuln/detail/CVE-2004-0138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0148">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-08T00:00:00</PublicDate>
    <Bugzilla id="1617160" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617160" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0148
https://nvd.nist.gov/vuln/detail/CVE-2004-0148
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0154">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617162" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617162" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:072">RHSA-2004:072</Advisory>
        <Package name="nfs-utils">nfs-utils-0:1.0.6-7.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0154
https://nvd.nist.gov/vuln/detail/CVE-2004-0154
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0155">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-05T00:00:00</PublicDate>
    <Bugzilla id="1617163" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617163" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The KAME IKE Daemon Racoon, when authenticating a peer during Phase 1, validates the X.509 certificate but does not verify the RSA signature authentication, which allows remote attackers to establish unauthorized IP connections or conduct man-in-the-middle attacks using a valid, trusted X.509 certificate.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:165">RHSA-2004:165</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0155
https://nvd.nist.gov/vuln/detail/CVE-2004-0155
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0164">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-13T00:00:00</PublicDate>
    <Bugzilla id="1617164" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617164" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:165">RHSA-2004:165</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0164
https://nvd.nist.gov/vuln/detail/CVE-2004-0164
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0174">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-19T00:00:00</PublicDate>
    <Bugzilla id="1617165" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617165" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache 1.4.x before 1.3.30, and 2.0.x before 2.0.49, when using multiple listening sockets on certain platforms, allows remote attackers to cause a denial of service (blocked new connections) via a &quot;short-lived connection on a rarely-accessed listening socket.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect Linux.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:405">RHSA-2004:405</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0174
https://nvd.nist.gov/vuln/detail/CVE-2004-0174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0175">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2000-09-01T00:00:00</PublicDate>
    <Bugzilla id="1617166" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617166" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files.  NOTE: this may be a rediscovery of CVE-2000-0992.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:074">RHSA-2005:074</Advisory>
        <Package name="rsh">rsh-0:0.17-17.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:106">RHSA-2005:106</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:562">RHSA-2005:562</Advisory>
        <Package name="krb5">krb5-0:1.2.7-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:165">RHSA-2005:165</Advisory>
        <Package name="rsh">rsh-0:0.17-25.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:567">RHSA-2005:567</Advisory>
        <Package name="krb5">krb5-0:1.3.4-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:481">RHSA-2005:481</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:495">RHSA-2005:495</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:481">RHSA-2005:481</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:495">RHSA-2005:495</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:481">RHSA-2005:481</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:495">RHSA-2005:495</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:481">RHSA-2005:481</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:495">RHSA-2005:495</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0175
https://nvd.nist.gov/vuln/detail/CVE-2004-0175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0176">
    <PublicDate>2004-03-04T00:00:00</PublicDate>
    <Bugzilla id="1617167" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617167" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:136">RHSA-2004:136</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:137">RHSA-2004:137</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0176
https://nvd.nist.gov/vuln/detail/CVE-2004-0176
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0177">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-28T00:00:00</PublicDate>
    <Bugzilla id="1617168" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617168" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:166">RHSA-2004:166</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0177
https://nvd.nist.gov/vuln/detail/CVE-2004-0177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0178">
    <PublicDate>2004-03-26T00:00:00</PublicDate>
    <Bugzilla id="1617169" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617169" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x before 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:413">RHSA-2004:413</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:437">RHSA-2004:437</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:437">RHSA-2004:437</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:437">RHSA-2004:437</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0178
https://nvd.nist.gov/vuln/detail/CVE-2004-0178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0179">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617170" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617170" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:160">RHSA-2004:160</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.0-15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:157">RHSA-2004:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:157">RHSA-2004:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:157">RHSA-2004:157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:158">RHSA-2004:158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:159">RHSA-2004:159</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:163">RHSA-2004:163</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:157">RHSA-2004:157</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0179
https://nvd.nist.gov/vuln/detail/CVE-2004-0179
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0180">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617171" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617171" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The client for CVS before 1.11 allows a remote malicious CVS server to create arbitrary files using certain RCS diff files that use absolute pathnames during checkouts or updates, a different vulnerability than CVE-2004-0405.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:153">RHSA-2004:153</Advisory>
        <Package name="cvs">cvs-0:1.11.2-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:154">RHSA-2004:154</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0180
https://nvd.nist.gov/vuln/detail/CVE-2004-0180
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0181">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-28T00:00:00</PublicDate>
    <Bugzilla id="1617172" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617172" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0181
https://nvd.nist.gov/vuln/detail/CVE-2004-0181
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0182">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617173" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617173" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:156">RHSA-2004:156</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:156">RHSA-2004:156</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:156">RHSA-2004:156</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0182
https://nvd.nist.gov/vuln/detail/CVE-2004-0182
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0183">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-29T00:00:00</PublicDate>
    <Bugzilla id="1617174" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617174" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via ISAKMP packets containing a Delete payload with a large number of SPI's, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:219">RHSA-2004:219</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0183
https://nvd.nist.gov/vuln/detail/CVE-2004-0183
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0184">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-29T00:00:00</PublicDate>
    <Bugzilla id="1617175" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617175" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:219">RHSA-2004:219</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0184
https://nvd.nist.gov/vuln/detail/CVE-2004-0184
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0185">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-03-08T00:00:00</PublicDate>
    <Bugzilla id="1617176" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617176" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the skey_challenge function in ftpd.c for wu-ftp daemon (wu-ftpd) 2.6.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a s/key (SKEY) request with a long name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-03-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:096">RHSA-2004:096</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0185
https://nvd.nist.gov/vuln/detail/CVE-2004-0185
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0189">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-29T00:00:00</PublicDate>
    <Bugzilla id="1617177" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617177" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;%xx&quot; URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL (&quot;%00&quot;) character, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:133">RHSA-2004:133</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-5.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:134">RHSA-2004:134</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0189
https://nvd.nist.gov/vuln/detail/CVE-2004-0189
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0191">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-25T00:00:00</PublicDate>
    <Bugzilla id="1617178" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617178" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.4.2 executes Javascript events in the context of a new page while it is being loaded, allowing it to interact with the previous page (zombie document) and enable cross-domain and cross-site scripting (XSS) attacks, as demonstrated using onmousemove events.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:112">RHSA-2004:112</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0191
https://nvd.nist.gov/vuln/detail/CVE-2004-0191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0226">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-29T00:00:00</PublicDate>
    <Bugzilla id="1617179" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617179" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:173">RHSA-2004:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0226
https://nvd.nist.gov/vuln/detail/CVE-2004-0226
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0230">
    <Details source="Mitre" xml:lang="en:us">
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
    </Details>
    <Statement xml:lang="en:us">
The DHS advisory is a good source of background information about the issue: https://www.cisa.gov/news-events/alerts/2004/04/20/vulnerabilities-tcp

It is important to note that the issue described is a known function of TCP. In order to perform a connection reset an attacker would need to know the source and destination ip address and ports as well as being able to guess the sequence number within the window. These requirements seriously reduce the ability to trigger a connection reset on normal TCP connections. The DHS advisory explains that BGP routing is a specific case where being able to trigger a reset is easier than expected as the end points can be easily determined and large window sizes are used. BGP routing is also signficantly affected by having its connections terminated. The major BGP peers have recently switched to requiring md5 signatures which mitigates against this attack.

The following article from Linux Weekly News also puts the flaw into context and shows why it does not pose a significant threat:
https://lwn.net/Articles/81560/

Red Hat does not have any plans for action regarding this issue.

    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0230
https://nvd.nist.gov/vuln/detail/CVE-2004-0230
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0231">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-04-29T00:00:00</PublicDate>
    <Bugzilla id="1617180" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617180" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to &quot;Insecure temporary file and directory creations.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:173">RHSA-2004:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0231
https://nvd.nist.gov/vuln/detail/CVE-2004-0231
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0232">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-29T00:00:00</PublicDate>
    <Bugzilla id="1617181" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617181" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:173">RHSA-2004:173</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:172">RHSA-2004:172</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0232
https://nvd.nist.gov/vuln/detail/CVE-2004-0232
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0233">
    <PublicDate>2004-04-03T00:00:00</PublicDate>
    <Bugzilla id="1617182" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617182" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:174">RHSA-2004:174</Advisory>
        <Package name="utempter">utempter-0:0.5.5-1.3EL.0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:175">RHSA-2004:175</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0233
https://nvd.nist.gov/vuln/detail/CVE-2004-0233
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0234">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-05-01T00:00:00</PublicDate>
    <Bugzilla id="1618362" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618362" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ulf Härnhammar for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:178">RHSA-2004:178</Advisory>
        <Package name="lha">lha-0:1.14i-10.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:179">RHSA-2004:179</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0234
https://nvd.nist.gov/vuln/detail/CVE-2004-0234
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0235">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617184" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617184" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes (&quot;//absolute/path&quot;).
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ulf Härnhammar for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:178">RHSA-2004:178</Advisory>
        <Package name="lha">lha-0:1.14i-10.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:179">RHSA-2004:179</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0235
https://nvd.nist.gov/vuln/detail/CVE-2004-0235
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0365">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-18T00:00:00</PublicDate>
    <Bugzilla id="1617185" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617185" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:136">RHSA-2004:136</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:137">RHSA-2004:137</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0365
https://nvd.nist.gov/vuln/detail/CVE-2004-0365
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0367">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-22T00:00:00</PublicDate>
    <Bugzilla id="1617186" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617186" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:136">RHSA-2004:136</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:137">RHSA-2004:137</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0367
https://nvd.nist.gov/vuln/detail/CVE-2004-0367
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0381">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-24T00:00:00</PublicDate>
    <Bugzilla id="1617187" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617187" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:569">RHSA-2004:569</Advisory>
        <Package name="mysql">mysql-0:3.23.58-2.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0381
https://nvd.nist.gov/vuln/detail/CVE-2004-0381
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0387">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-04-06T00:00:00</PublicDate>
    <Bugzilla id="1617189" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617189" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0387
https://nvd.nist.gov/vuln/detail/CVE-2004-0387
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0388">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617190" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617190" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:569">RHSA-2004:569</Advisory>
        <Package name="mysql">mysql-0:3.23.58-2.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0388
https://nvd.nist.gov/vuln/detail/CVE-2004-0388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0396">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-05-19T00:00:00</PublicDate>
    <Bugzilla id="1617191" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617191" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Derek Price and Stefan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:190">RHSA-2004:190</Advisory>
        <Package name="cvs">cvs-0:1.11.2-22</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0396
https://nvd.nist.gov/vuln/detail/CVE-2004-0396
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0398">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-05-19T00:00:00</PublicDate>
    <Bugzilla id="1617192" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617192" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:191">RHSA-2004:191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:191">RHSA-2004:191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:191">RHSA-2004:191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:191">RHSA-2004:191</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0398
https://nvd.nist.gov/vuln/detail/CVE-2004-0398
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0403">
    <PublicDate>2004-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617193" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617193" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet with a large length field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:165">RHSA-2004:165</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0403
https://nvd.nist.gov/vuln/detail/CVE-2004-0403
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0405">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-04-14T00:00:00</PublicDate>
    <Bugzilla id="1617194" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617194" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CVS before 1.11 allows CVS clients to read arbitrary files via .. (dot dot) sequences in filenames via CVS client requests, a different vulnerability than CVE-2004-0180.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:153">RHSA-2004:153</Advisory>
        <Package name="cvs">cvs-0:1.11.2-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:154">RHSA-2004:154</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0405
https://nvd.nist.gov/vuln/detail/CVE-2004-0405
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0409">
    <PublicDate>2004-04-05T00:00:00</PublicDate>
    <Bugzilla id="1617195" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617195" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:585">RHSA-2004:585</Advisory>
        <Package name="xchat">xchat-1:2.0.4-4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:177">RHSA-2004:177</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0409
https://nvd.nist.gov/vuln/detail/CVE-2004-0409
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0411">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617196" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617196" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The URI handlers in Konqueror for KDE 3.2.2 and earlier do not properly filter &quot;-&quot; characters that begin a hostname in a (1) telnet, (2) rlogin, (3) ssh, or (4) mailto URI, which allows remote attackers to manipulate the options that are passed to the associated programs, possibly to read arbitrary files or execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:222">RHSA-2004:222</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:222">RHSA-2004:222</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0411
https://nvd.nist.gov/vuln/detail/CVE-2004-0411
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0412">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2021-10-02T00:00:00</PublicDate>
    <Bugzilla id="2011228" url="https://bugzilla.redhat.com/show_bug.cgi?id=2011228" xml:lang="en:us">
mailman: password stealing via a crafted email request
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-639</CWE>
    <Details source="Mitre" xml:lang="en:us">
Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
Mailman versions 2.1.5 and below allow for user passwords to be obtained via a crafted email which can compromise data confidentiality.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mailman</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mailman</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mailman:2.1/mailman</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0412
https://nvd.nist.gov/vuln/detail/CVE-2004-0412
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0414">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617197" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617197" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle malformed &quot;Entry&quot; lines, which prevents a NULL terminator from being used and may lead to a denial of service (crash), modification of critical program data, or arbitrary code execution.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Derek Price for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:233">RHSA-2004:233</Advisory>
        <Package name="cvs">cvs-0:1.11.2-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0414
https://nvd.nist.gov/vuln/detail/CVE-2004-0414
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0415">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-03T00:00:00</PublicDate>
    <Bugzilla id="1617198" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617198" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank a number of vendor-sec participants and iSEC Security Research for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:413">RHSA-2004:413</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0415
https://nvd.nist.gov/vuln/detail/CVE-2004-0415
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0416">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617200" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617200" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability for the error_prog_name string in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to execute arbitrary code.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Sebastian Krahmer and Stefan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:233">RHSA-2004:233</Advisory>
        <Package name="cvs">cvs-0:1.11.2-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0416
https://nvd.nist.gov/vuln/detail/CVE-2004-0416
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0417">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617201" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617201" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the &quot;Max-dotdot&quot; CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Sebastian Krahmer and Stefan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:233">RHSA-2004:233</Advisory>
        <Package name="cvs">cvs-0:1.11.2-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0417
https://nvd.nist.gov/vuln/detail/CVE-2004-0417
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0418">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617202" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617202" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an &quot;out-of-bounds&quot; write for a single byte to execute arbitrary code or modify critical program data.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Sebastian Krahmer and Stefan Esser for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:233">RHSA-2004:233</Advisory>
        <Package name="cvs">cvs-0:1.11.2-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0418
https://nvd.nist.gov/vuln/detail/CVE-2004-0418
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0419">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-19T00:00:00</PublicDate>
    <Bugzilla id="1617203" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617203" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
XDM in XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0, which could allow remote attackers to connect to the port, in violation of the intended restrictions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:478">RHSA-2004:478</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-69.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0419
https://nvd.nist.gov/vuln/detail/CVE-2004-0419
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0421">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-29T00:00:00</PublicDate>
    <Bugzilla id="121229" url="https://bugzilla.redhat.com/show_bug.cgi?id=121229" xml:lang="en:us">
CAN-2004-0421 libpng can access out of bounds memory
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:180">RHSA-2004:180</Advisory>
        <Package name="libpng">libpng-2:1.2.2-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:180">RHSA-2004:180</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:181">RHSA-2004:181</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0421
https://nvd.nist.gov/vuln/detail/CVE-2004-0421
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0422">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617204" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617204" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
flim before 1.14.3 creates temporary files insecurely, which allows local users to overwrite arbitrary files of the Emacs user via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:344">RHSA-2004:344</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:344">RHSA-2004:344</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:344">RHSA-2004:344</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:344">RHSA-2004:344</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0422
https://nvd.nist.gov/vuln/detail/CVE-2004-0422
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0424">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-20T00:00:00</PublicDate>
    <Bugzilla id="1617205" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617205" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:183">RHSA-2004:183</Advisory>
        <Package name="kernel">kernel-0:2.4.21-9.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0424
https://nvd.nist.gov/vuln/detail/CVE-2004-0424
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0426">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-26T00:00:00</PublicDate>
    <Bugzilla id="1617206" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617206" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows remote attackers to write files outside of the module's path.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:192">RHSA-2004:192</Advisory>
        <Package name="rsync">rsync-0:2.5.7-4.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0426
https://nvd.nist.gov/vuln/detail/CVE-2004-0426
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0427">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-04-08T00:00:00</PublicDate>
    <Bugzilla id="1617207" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617207" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:255">RHSA-2004:255</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0427
https://nvd.nist.gov/vuln/detail/CVE-2004-0427
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0447">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-19T00:00:00</PublicDate>
    <Bugzilla id="1617208" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617208" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Linux before 2.4.26 for IA64 allows local users to cause a denial of service, with unknown impact.  NOTE: due to a typo, this issue was accidentally assigned CVE-2004-0477.  This is the proper candidate to use for the Linux local DoS.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:413">RHSA-2004:413</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.4.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0447
https://nvd.nist.gov/vuln/detail/CVE-2004-0447
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0452">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-23T00:00:00</PublicDate>
    <Bugzilla id="1618363" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618363" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:105">RHSA-2005:105</Advisory>
        <Package name="perl">perl-2:5.8.0-89.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:103">RHSA-2005:103</Advisory>
        <Package name="perl">perl-3:5.8.5-12.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0452
https://nvd.nist.gov/vuln/detail/CVE-2004-0452
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0457">
    <PublicDate>2004-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617209" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617209" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:569">RHSA-2004:569</Advisory>
        <Package name="mysql">mysql-0:3.23.58-2.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0457
https://nvd.nist.gov/vuln/detail/CVE-2004-0457
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0488">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-17T00:00:00</PublicDate>
    <Bugzilla id="430867" url="https://bugzilla.redhat.com/show_bug.cgi?id=430867" xml:lang="en:us">
mod_ssl ssl_util_uuencode_binary CA issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:342">RHSA-2004:342</Advisory>
        <Package name="httpd">httpd-0:2.0.46-32.ent.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:405">RHSA-2004:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0488
https://nvd.nist.gov/vuln/detail/CVE-2004-0488
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0491">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-21T00:00:00</PublicDate>
    <Bugzilla id="1617210" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617210" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:472">RHSA-2005:472</Advisory>
        <Package name="kernel">kernel-0:2.4.21-32.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0491
https://nvd.nist.gov/vuln/detail/CVE-2004-0491
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0492">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-06-10T00:00:00</PublicDate>
    <Bugzilla id="430527" url="https://bugzilla.redhat.com/show_bug.cgi?id=430527" xml:lang="en:us">
httpd mod_proxy buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:245">RHSA-2004:245</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0492
https://nvd.nist.gov/vuln/detail/CVE-2004-0492
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0493">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-28T00:00:00</PublicDate>
    <Bugzilla id="1617211" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617211" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:342">RHSA-2004:342</Advisory>
        <Package name="httpd">httpd-0:2.0.46-32.ent.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0493
https://nvd.nist.gov/vuln/detail/CVE-2004-0493
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0494">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617212" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617212" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:373">RHSA-2004:373</Advisory>
        <Package name="gnome-vfs2">gnome-vfs2-0:2.2.5-2E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:464">RHSA-2004:464</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:464">RHSA-2004:464</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:464">RHSA-2004:464</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0494
https://nvd.nist.gov/vuln/detail/CVE-2004-0494
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0495">
    <PublicDate>2004-06-17T00:00:00</PublicDate>
    <Bugzilla id="1617213" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617213" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:255">RHSA-2004:255</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0495
https://nvd.nist.gov/vuln/detail/CVE-2004-0495
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0497">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-30T00:00:00</PublicDate>
    <Bugzilla id="1617214" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617214" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:360">RHSA-2004:360</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:354">RHSA-2004:354</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:354">RHSA-2004:354</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:354">RHSA-2004:354</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0497
https://nvd.nist.gov/vuln/detail/CVE-2004-0497
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0500">
    <PublicDate>2004-08-05T00:00:00</PublicDate>
    <Bugzilla id="1617215" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617215" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via MSNSLP protocol messages that are not properly handled in a strncpy call.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0500
https://nvd.nist.gov/vuln/detail/CVE-2004-0500
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0504">
    <PublicDate>2004-05-03T00:00:00</PublicDate>
    <Bugzilla id="1617216" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617216" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:234">RHSA-2004:234</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0504
https://nvd.nist.gov/vuln/detail/CVE-2004-0504
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0505">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-13T00:00:00</PublicDate>
    <Bugzilla id="1617217" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617217" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:234">RHSA-2004:234</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0505
https://nvd.nist.gov/vuln/detail/CVE-2004-0505
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0506">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-13T00:00:00</PublicDate>
    <Bugzilla id="1617218" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617218" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:234">RHSA-2004:234</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0506
https://nvd.nist.gov/vuln/detail/CVE-2004-0506
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0507">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-13T00:00:00</PublicDate>
    <Bugzilla id="1617219" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617219" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:234">RHSA-2004:234</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0507
https://nvd.nist.gov/vuln/detail/CVE-2004-0507
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0519">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-04-29T00:00:00</PublicDate>
    <Bugzilla id="1617220" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617220" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:240">RHSA-2004:240</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3-0.e3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0519
https://nvd.nist.gov/vuln/detail/CVE-2004-0519
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0520">
    <PublicDate>2004-05-23T00:00:00</PublicDate>
    <Bugzilla id="1617221" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617221" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:240">RHSA-2004:240</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3-0.e3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0520
https://nvd.nist.gov/vuln/detail/CVE-2004-0520
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0521">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-27T00:00:00</PublicDate>
    <Bugzilla id="1617222" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617222" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:240">RHSA-2004:240</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3-0.e3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0521
https://nvd.nist.gov/vuln/detail/CVE-2004-0521
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0523">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-01T00:00:00</PublicDate>
    <Bugzilla id="1617223" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617223" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:236">RHSA-2004:236</Advisory>
        <Package name="krb5">krb5-0:1.2.7-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0523
https://nvd.nist.gov/vuln/detail/CVE-2004-0523
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0535">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-14T00:00:00</PublicDate>
    <Bugzilla id="1617224" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617224" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory.  NOTE: this issue was originally incorrectly reported as a &quot;buffer overflow&quot; by some sources.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:413">RHSA-2004:413</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0535
https://nvd.nist.gov/vuln/detail/CVE-2004-0535
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0536">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-02T00:00:00</PublicDate>
    <Bugzilla id="1617225" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617225" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Tripwire commercial 4.0.1 and earlier, including 2.4, and open source 2.3.1 and earlier, allows local users to gain privileges via format string specifiers in a file name, which is used in the generation of an email report.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:244">RHSA-2004:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:244">RHSA-2004:244</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:244">RHSA-2004:244</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0536
https://nvd.nist.gov/vuln/detail/CVE-2004-0536
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0541">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-08T00:00:00</PublicDate>
    <Bugzilla id="1617226" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617226" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password (&quot;pass&quot; variable).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:242">RHSA-2004:242</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0541
https://nvd.nist.gov/vuln/detail/CVE-2004-0541
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0550">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-06-10T00:00:00</PublicDate>
    <Bugzilla id="1617227" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617227" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Real Networks RealPlayer 10 allows remote attackers to execute arbitrary code via a URL with a large number of &quot;.&quot; (period) characters.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0550
https://nvd.nist.gov/vuln/detail/CVE-2004-0550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0554">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617228" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617228" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a &quot;crash.c&quot; program.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:255">RHSA-2004:255</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:260">RHSA-2004:260</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0554
https://nvd.nist.gov/vuln/detail/CVE-2004-0554
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0557">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-28T00:00:00</PublicDate>
    <Bugzilla id="1617229" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617229" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:409">RHSA-2004:409</Advisory>
        <Package name="sox">sox-0:12.17.4-4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0557
https://nvd.nist.gov/vuln/detail/CVE-2004-0557
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0558">
    <PublicDate>2004-08-21T00:00:00</PublicDate>
    <Bugzilla id="1617230" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617230" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:449">RHSA-2004:449</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0558
https://nvd.nist.gov/vuln/detail/CVE-2004-0558
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0565">
    <PublicDate>2004-05-28T00:00:00</PublicDate>
    <Bugzilla id="1617231" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617231" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0565
https://nvd.nist.gov/vuln/detail/CVE-2004-0565
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0587">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617232" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617232" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:413">RHSA-2004:413</Advisory>
        <Package name="kernel">kernel-0:2.4.21-15.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:418">RHSA-2004:418</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:327">RHSA-2004:327</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0587
https://nvd.nist.gov/vuln/detail/CVE-2004-0587
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0594">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-13T00:00:00</PublicDate>
    <Bugzilla id="1617233" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617233" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:392">RHSA-2004:392</Advisory>
        <Package name="php">php-0:4.3.2-11.1.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:405">RHSA-2004:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0594
https://nvd.nist.gov/vuln/detail/CVE-2004-0594
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0595">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-14T00:00:00</PublicDate>
    <Bugzilla id="1617234" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617234" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:392">RHSA-2004:392</Advisory>
        <Package name="php">php-0:4.3.2-11.1.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:395">RHSA-2004:395</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:405">RHSA-2004:405</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0595
https://nvd.nist.gov/vuln/detail/CVE-2004-0595
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0597">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617235" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617235" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng">libpng-2:1.2.2-25</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0597
https://nvd.nist.gov/vuln/detail/CVE-2004-0597
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0598">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617236" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617236" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng">libpng-2:1.2.2-25</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0598
https://nvd.nist.gov/vuln/detail/CVE-2004-0598
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0599">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617237" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617237" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the (1) png_read_png in pngread.c or (2) png_handle_sPLT functions in pngrutil.c or (3) progressive display image reading capability in libpng 1.2.5 and earlier allow remote attackers to cause a denial of service (application crash) via a malformed PNG image.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng">libpng-2:1.2.2-25</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:402">RHSA-2004:402</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:429">RHSA-2004:429</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0599
https://nvd.nist.gov/vuln/detail/CVE-2004-0599
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0600">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617238" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617238" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:259">RHSA-2004:259</Advisory>
        <Package name="samba">samba-0:3.0.4-6.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0600
https://nvd.nist.gov/vuln/detail/CVE-2004-0600
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0603">
    <Details source="Mitre" xml:lang="en:us">
gzexe in gzip 1.3.3 and earlier will execute an argument when the creation of a temp file fails instead of exiting the program, which could allow remote attackers or local users to execute arbitrary commands, a different vulnerability than CVE-1999-1332.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0603
https://nvd.nist.gov/vuln/detail/CVE-2004-0603
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0607">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-15T00:00:00</PublicDate>
    <Bugzilla id="1617239" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617239" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:308">RHSA-2004:308</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0607
https://nvd.nist.gov/vuln/detail/CVE-2004-0607
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0619">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-23T00:00:00</PublicDate>
    <Bugzilla id="1617240" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617240" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0619
https://nvd.nist.gov/vuln/detail/CVE-2004-0619
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0627">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-05T00:00:00</PublicDate>
    <Bugzilla id="674431" url="https://bugzilla.redhat.com/show_bug.cgi?id=674431" xml:lang="en:us">
MySQL: check_scramble_323 authentication bypass and buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 4, 5, or 6.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0627
https://nvd.nist.gov/vuln/detail/CVE-2004-0627
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0628">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-05T00:00:00</PublicDate>
    <Bugzilla id="674431" url="https://bugzilla.redhat.com/show_bug.cgi?id=674431" xml:lang="en:us">
MySQL: check_scramble_323 authentication bypass and buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 4, 5, or 6.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0628
https://nvd.nist.gov/vuln/detail/CVE-2004-0628
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0630">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617241" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617241" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The uudecoding feature in Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via shell metacharacters (&quot;`&quot; or backtick) in the filename of the PDF file that is provided to the uudecode command.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:432">RHSA-2004:432</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0630
https://nvd.nist.gov/vuln/detail/CVE-2004-0630
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0631">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617242" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617242" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the uudecoding feature for Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via a long filename for the PDF file that is provided to the uudecode command.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:432">RHSA-2004:432</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0631
https://nvd.nist.gov/vuln/detail/CVE-2004-0631
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0633">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-06T00:00:00</PublicDate>
    <Bugzilla id="1617243" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617243" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:378">RHSA-2004:378</Advisory>
        <Package name="ethereal">ethereal-0:0.10.5-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0633
https://nvd.nist.gov/vuln/detail/CVE-2004-0633
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0634">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-07-06T00:00:00</PublicDate>
    <Bugzilla id="1617244" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617244" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:378">RHSA-2004:378</Advisory>
        <Package name="ethereal">ethereal-0:0.10.5-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0634
https://nvd.nist.gov/vuln/detail/CVE-2004-0634
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0635">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-06T00:00:00</PublicDate>
    <Bugzilla id="1617245" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617245" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:378">RHSA-2004:378</Advisory>
        <Package name="ethereal">ethereal-0:0.10.5-0.30E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0635
https://nvd.nist.gov/vuln/detail/CVE-2004-0635
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0642">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-08-31T00:00:00</PublicDate>
    <Bugzilla id="1617246" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617246" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:350">RHSA-2004:350</Advisory>
        <Package name="krb5">krb5-0:1.2.7-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0642
https://nvd.nist.gov/vuln/detail/CVE-2004-0642
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0643">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-08-31T00:00:00</PublicDate>
    <Bugzilla id="1617247" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617247" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:350">RHSA-2004:350</Advisory>
        <Package name="krb5">krb5-0:1.2.7-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0643
https://nvd.nist.gov/vuln/detail/CVE-2004-0643
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0644">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-31T00:00:00</PublicDate>
    <Bugzilla id="1617248" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617248" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote attackers to cause a denial of service (infinite loop) via a certain BER encoding.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:350">RHSA-2004:350</Advisory>
        <Package name="krb5">krb5-0:1.2.7-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-08-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:448">RHSA-2004:448</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0644
https://nvd.nist.gov/vuln/detail/CVE-2004-0644
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0657">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2020-06-18T00:00:00</PublicDate>
    <Bugzilla id="1850552" url="https://bugzilla.redhat.com/show_bug.cgi?id=1850552" xml:lang="en:us">
ntp: wrong date/time offset return could lead to integer overflow
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>7.1</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
    </Details>
    <Statement xml:lang="en:us">
As per the CERT advisory, this issue has been resolved by ntp version 4. All Red Hat products ship ntp-4, therefore there are not affected by this flaw.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ntp</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ntp</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ntp</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0657
https://nvd.nist.gov/vuln/detail/CVE-2004-0657
https://www.kb.cert.org/vuls/id/584606
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0685">
    <PublicDate>2003-10-23T00:00:00</PublicDate>
    <Bugzilla id="1617249" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617249" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0685
https://nvd.nist.gov/vuln/detail/CVE-2004-0685
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0686">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617250" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617250" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the &quot;mangling method = hash&quot; option is enabled in smb.conf, has unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:259">RHSA-2004:259</Advisory>
        <Package name="samba">samba-0:3.0.4-6.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-07-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:404">RHSA-2004:404</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-07-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:404">RHSA-2004:404</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-07-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:404">RHSA-2004:404</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-07-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:404">RHSA-2004:404</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0686
https://nvd.nist.gov/vuln/detail/CVE-2004-0686
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0687">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-07T00:00:00</PublicDate>
    <Bugzilla id="430513" url="https://bugzilla.redhat.com/show_bug.cgi?id=430513" xml:lang="en:us">
openmotif21 stack overflows in libxpm
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:478">RHSA-2004:478</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-69.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-4.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0687
https://nvd.nist.gov/vuln/detail/CVE-2004-0687
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0688">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="430515" url="https://bugzilla.redhat.com/show_bug.cgi?id=430515" xml:lang="en:us">
openmotif21 stack overflows in libxpm
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:478">RHSA-2004:478</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-69.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-4.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0688
https://nvd.nist.gov/vuln/detail/CVE-2004-0688
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0689">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-11T00:00:00</PublicDate>
    <Bugzilla id="1617251" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617251" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDE before 3.3.0 does not properly handle when certain symbolic links point to &quot;stale&quot; locations, which could allow local users to create or truncate arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0689
https://nvd.nist.gov/vuln/detail/CVE-2004-0689
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0691">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617252" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617252" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the BMP image format parser for the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:414">RHSA-2004:414</Advisory>
        <Package name="qt">qt-1:3.1.2-13.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0691
https://nvd.nist.gov/vuln/detail/CVE-2004-0691
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0692">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617253" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617253" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XPM parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0693.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:414">RHSA-2004:414</Advisory>
        <Package name="qt">qt-1:3.1.2-13.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:478">RHSA-2004:478</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-69.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:479">RHSA-2004:479</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0692
https://nvd.nist.gov/vuln/detail/CVE-2004-0692
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0693">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617254" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617254" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GIF parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0692.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-08-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:414">RHSA-2004:414</Advisory>
        <Package name="qt">qt-1:3.1.2-13.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0693
https://nvd.nist.gov/vuln/detail/CVE-2004-0693
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0694">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-11T00:00:00</PublicDate>
    <Bugzilla id="1617255" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617255" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to &quot;command line processing,&quot; a different vulnerability than CVE-2004-0771.  NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:323">RHSA-2004:323</Advisory>
        <Package name="lha">lha-0:1.14i-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0694
https://nvd.nist.gov/vuln/detail/CVE-2004-0694
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0700">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-16T00:00:00</PublicDate>
    <Bugzilla id="430866" url="https://bugzilla.redhat.com/show_bug.cgi?id=430866" xml:lang="en:us">
mod_proxy hook format string
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:408">RHSA-2004:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:408">RHSA-2004:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:408">RHSA-2004:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:408">RHSA-2004:408</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-07-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:405">RHSA-2004:405</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0700
https://nvd.nist.gov/vuln/detail/CVE-2004-0700
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0718">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-01T00:00:00</PublicDate>
    <Bugzilla id="1617256" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617256" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0718
https://nvd.nist.gov/vuln/detail/CVE-2004-0718
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0721">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-07-01T00:00:00</PublicDate>
    <Bugzilla id="1617257" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617257" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0721
https://nvd.nist.gov/vuln/detail/CVE-2004-0721
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0722">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617258" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617258" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0722
https://nvd.nist.gov/vuln/detail/CVE-2004-0722
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0745">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-11T00:00:00</PublicDate>
    <Bugzilla id="1617259" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617259" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
LHA 1.14 and earlier allows attackers to execute arbitrary commands via a directory with shell metacharacters in its name.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:323">RHSA-2004:323</Advisory>
        <Package name="lha">lha-0:1.14i-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0745
https://nvd.nist.gov/vuln/detail/CVE-2004-0745
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0746">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617260" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617260" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror in KDE 3.2.3 and earlier allows web sites to set cookies for country-specific top-level domains, such as .ltd.uk, .plc.uk and .firm.in, which could allow remote attackers to perform a session fixation attack and hijack a user's HTTP session.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:412">RHSA-2004:412</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0746
https://nvd.nist.gov/vuln/detail/CVE-2004-0746
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0747">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617261" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617261" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:463">RHSA-2004:463</Advisory>
        <Package name="httpd">httpd-0:2.0.46-40.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0747
https://nvd.nist.gov/vuln/detail/CVE-2004-0747
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0748">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-07T00:00:00</PublicDate>
    <Bugzilla id="1617262" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617262" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:349">RHSA-2004:349</Advisory>
        <Package name="httpd">httpd-0:2.0.46-38.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0748
https://nvd.nist.gov/vuln/detail/CVE-2004-0748
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0750">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617263" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617263" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in redhat-config-nfs before 1.0.13, when shares are exported to multiple hosts, can produce incorrect permissions and prevent the all_squash option from being applied.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:434">RHSA-2004:434</Advisory>
        <Package name="redhat-config-nfs">redhat-config-nfs-0:1.0.13-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0750
https://nvd.nist.gov/vuln/detail/CVE-2004-0750
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0751">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617264" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617264" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:463">RHSA-2004:463</Advisory>
        <Package name="httpd">httpd-0:2.0.46-40.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0751
https://nvd.nist.gov/vuln/detail/CVE-2004-0751
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0752">
    <PublicDate>2004-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617265" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617265" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenOffice (OOo) 1.1.2 creates predictable directory names with insecure permissions during startup, which may allow local users to read or list files of other users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:446">RHSA-2004:446</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.0-16.14.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0752
https://nvd.nist.gov/vuln/detail/CVE-2004-0752
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0753">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617266" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617266" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BMP image processor for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted BMP file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:447">RHSA-2004:447</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-11.3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:466">RHSA-2004:466</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0753
https://nvd.nist.gov/vuln/detail/CVE-2004-0753
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0754">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-26T00:00:00</PublicDate>
    <Bugzilla id="1617267" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617267" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the size variable in Groupware server messages.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0754
https://nvd.nist.gov/vuln/detail/CVE-2004-0754
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0755">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617269" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617269" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The FileStore capability in CGI::Session for Ruby before 1.8.1, and possibly PStore, creates files with insecure permissions, which can allow local users to steal session information and hijack sessions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:441">RHSA-2004:441</Advisory>
        <Package name="ruby">ruby-0:1.6.8-9.EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0755
https://nvd.nist.gov/vuln/detail/CVE-2004-0755
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0757">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617270" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617270" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0757
https://nvd.nist.gov/vuln/detail/CVE-2004-0757
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0758">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-03T00:00:00</PublicDate>
    <Bugzilla id="1617271" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617271" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla 1.5 through 1.7 allows a CA certificate to be imported even when their DN is the same as that of the built-in CA root certificate, which allows remote attackers to cause a denial of service to SSL pages because the malicious certificate is treated as invalid.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0758
https://nvd.nist.gov/vuln/detail/CVE-2004-0758
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0759">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617272" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617272" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.7 allows remote web servers to read arbitrary files via Javascript that sets the value of an &lt;input type=&quot;file&quot;&gt; tag.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0759
https://nvd.nist.gov/vuln/detail/CVE-2004-0759
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0760">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-07-11T00:00:00</PublicDate>
    <Bugzilla id="1617273" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617273" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla allows remote attackers to cause Mozilla to open a URI as a different MIME type than expected via a null character (%00) in an FTP URI.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0760
https://nvd.nist.gov/vuln/detail/CVE-2004-0760
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0761">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617274" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617274" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote attackers to use certain redirect sequences to spoof the security lock icon that makes a web page appear to be encrypted.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0761
https://nvd.nist.gov/vuln/detail/CVE-2004-0761
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0762">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-01T00:00:00</PublicDate>
    <Bugzilla id="1617275" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617275" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0762
https://nvd.nist.gov/vuln/detail/CVE-2004-0762
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0763">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-26T00:00:00</PublicDate>
    <Bugzilla id="1617276" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617276" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates of trusted web sites via redirects and Javascript that uses the &quot;onunload&quot; method.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0763
https://nvd.nist.gov/vuln/detail/CVE-2004-0763
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0764">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-30T00:00:00</PublicDate>
    <Bugzilla id="1617277" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617277" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the &quot;chrome&quot; flag and XML User Interface Language (XUL) files.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0764
https://nvd.nist.gov/vuln/detail/CVE-2004-0764
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0765">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-12T00:00:00</PublicDate>
    <Bugzilla id="1617278" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617278" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0765
https://nvd.nist.gov/vuln/detail/CVE-2004-0765
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0769">
    <PublicDate>2004-05-15T00:00:00</PublicDate>
    <Bugzilla id="1617279" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617279" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in LHA allows remote attackers to execute arbitrary code via long pathnames in LHarc format 2 headers for a .LHZ archive, as originally demonstrated using the &quot;x&quot; option but also exploitable through &quot;l&quot; and &quot;v&quot;, and fixed in header.c, a different issue than CVE-2004-0771.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:323">RHSA-2004:323</Advisory>
        <Package name="lha">lha-0:1.14i-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0769
https://nvd.nist.gov/vuln/detail/CVE-2004-0769
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0771">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-15T00:00:00</PublicDate>
    <Bugzilla id="1617280" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617280" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:323">RHSA-2004:323</Advisory>
        <Package name="lha">lha-0:1.14i-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:440">RHSA-2004:440</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0771
https://nvd.nist.gov/vuln/detail/CVE-2004-0771
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0772">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2003-03-27T00:00:00</PublicDate>
    <Bugzilla id="1617281" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617281" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerabilities in error handling code in krb524d for MIT Kerberos 5 (krb5) 1.2.8 and earlier may allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2003-03-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2003:052">RHSA-2003:052</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0772
https://nvd.nist.gov/vuln/detail/CVE-2004-0772
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0778">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617282" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617282" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Sebastian Krahmer for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:233">RHSA-2004:233</Advisory>
        <Package name="cvs">cvs-0:1.11.2-24</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0778
https://nvd.nist.gov/vuln/detail/CVE-2004-0778
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0782">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617283" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617283" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:447">RHSA-2004:447</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-11.3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:466">RHSA-2004:466</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0782
https://nvd.nist.gov/vuln/detail/CVE-2004-0782
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0783">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617284" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617284" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:447">RHSA-2004:447</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-11.3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:466">RHSA-2004:466</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0783
https://nvd.nist.gov/vuln/detail/CVE-2004-0783
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0784">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-26T00:00:00</PublicDate>
    <Bugzilla id="1617285" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617285" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The smiley theme functionality in Gaim before 0.82 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of the tar file that is dragged to the smiley selector.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0784
https://nvd.nist.gov/vuln/detail/CVE-2004-0784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0785">
    <PublicDate>2004-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617288" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617288" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Gaim before 0.82 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) Rich Text Format (RTF) messages, (2) a long hostname for the local system as obtained from DNS, or (3) a long URL that is not properly handled by the URL decoder.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0785
https://nvd.nist.gov/vuln/detail/CVE-2004-0785
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0786">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617289" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617289" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:463">RHSA-2004:463</Advisory>
        <Package name="httpd">httpd-0:2.0.46-40.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0786
https://nvd.nist.gov/vuln/detail/CVE-2004-0786
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0788">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617290" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617290" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:447">RHSA-2004:447</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-11.3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:466">RHSA-2004:466</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0788
https://nvd.nist.gov/vuln/detail/CVE-2004-0788
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0791">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-12T00:00:00</PublicDate>
    <Bugzilla id="1617291" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617291" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the &quot;ICMP Source Quench attack.&quot;  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:043">RHSA-2005:043</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0791
https://nvd.nist.gov/vuln/detail/CVE-2004-0791
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0792">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617292" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617292" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:436">RHSA-2004:436</Advisory>
        <Package name="rsync">rsync-0:2.5.7-5.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0792
https://nvd.nist.gov/vuln/detail/CVE-2004-0792
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0796">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-05T00:00:00</PublicDate>
    <Bugzilla id="1617293" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617293" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:451">RHSA-2004:451</Advisory>
        <Package name="spamassassin">spamassassin-0:2.55-3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0796
https://nvd.nist.gov/vuln/detail/CVE-2004-0796
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0803">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-13T00:00:00</PublicDate>
    <Bugzilla id="1617294" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617294" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:577">RHSA-2004:577</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-20.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:021">RHSA-2005:021</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:354">RHSA-2005:354</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0803
https://nvd.nist.gov/vuln/detail/CVE-2004-0803
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0804">
    <PublicDate>2002-03-15T00:00:00</PublicDate>
    <Bugzilla id="1617295" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617295" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:577">RHSA-2004:577</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-20.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:021">RHSA-2005:021</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:354">RHSA-2005:354</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0804
https://nvd.nist.gov/vuln/detail/CVE-2004-0804
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0806">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617296" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617296" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cdrecord in the cdrtools package before 2.01, when installed setuid root, does not properly drop privileges before executing a program specified in the RSH environment variable, which allows local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  cdrecord is not shipped setuid and does not need to be made setuid with Red Hat Enterprise Linux 2.1, 3, or 4 packages.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2005-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:447">RHBA-2005:447</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2005-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:447">RHBA-2005:447</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2005-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:447">RHBA-2005:447</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2005-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:447">RHBA-2005:447</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0806
https://nvd.nist.gov/vuln/detail/CVE-2004-0806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0807">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-13T00:00:00</PublicDate>
    <Bugzilla id="1617297" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617297" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:467">RHSA-2004:467</Advisory>
        <Package name="samba">samba-0:3.0.7-1.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0807
https://nvd.nist.gov/vuln/detail/CVE-2004-0807
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0808">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-13T00:00:00</PublicDate>
    <Bugzilla id="1617298" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617298" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:467">RHSA-2004:467</Advisory>
        <Package name="samba">samba-0:3.0.7-1.3E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0808
https://nvd.nist.gov/vuln/detail/CVE-2004-0808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0809">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617299" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617299" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:463">RHSA-2004:463</Advisory>
        <Package name="httpd">httpd-0:2.0.46-40.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0809
https://nvd.nist.gov/vuln/detail/CVE-2004-0809
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0811">
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Apache 2.0.51 prevents &quot;the merging of the Satisfy directive,&quot; which could allow attackers to obtain access to restricted resources contrary to the specified authentication configuration.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  This issue only affected Apache 2.0.51, which was not shipped in any version of Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0811
https://nvd.nist.gov/vuln/detail/CVE-2004-0811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0812">
    <PublicDate>2003-11-08T00:00:00</PublicDate>
    <Bugzilla id="1617300" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617300" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with &quot;setting up TSS limits,&quot; allows local users to cause a denial of service (crash) and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0812
https://nvd.nist.gov/vuln/detail/CVE-2004-0812
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0813">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-30T00:00:00</PublicDate>
    <Bugzilla id="1617301" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617301" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the SG_IO functionality in ide-cd allows local users to bypass read-only access and perform unauthorized write and erase operations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0465">RHSA-2007:0465</Advisory>
        <Package name="cdrtools">cdrtools-8:2.01.0.a32-0.EL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0465">RHSA-2007:0465</Advisory>
        <Package name="pam">pam-0:0.75-72</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0813
https://nvd.nist.gov/vuln/detail/CVE-2004-0813
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0814">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-07T00:00:00</PublicDate>
    <Bugzilla id="1617302" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617302" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0814
https://nvd.nist.gov/vuln/detail/CVE-2004-0814
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0815">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617303" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617303" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via &quot;/.////&quot; style sequences in pathnames.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:498">RHSA-2004:498</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:498">RHSA-2004:498</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:498">RHSA-2004:498</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:498">RHSA-2004:498</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0815
https://nvd.nist.gov/vuln/detail/CVE-2004-0815
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0817">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-25T00:00:00</PublicDate>
    <Bugzilla id="1617304" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617304" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:465">RHSA-2004:465</Advisory>
        <Package name="imlib">imlib-1:1.9.13-13.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0817
https://nvd.nist.gov/vuln/detail/CVE-2004-0817
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0823">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-07T00:00:00</PublicDate>
    <Bugzilla id="1617305" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617305" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:751">RHSA-2005:751</Advisory>
        <Package name="nss_ldap">nss_ldap-0:207-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:751">RHSA-2005:751</Advisory>
        <Package name="openldap">openldap-0:2.0.27-20</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0823
https://nvd.nist.gov/vuln/detail/CVE-2004-0823
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0827">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-24T00:00:00</PublicDate>
    <Bugzilla id="1617306" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617306" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:480">RHSA-2004:480</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:636">RHSA-2004:636</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:494">RHSA-2004:494</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0827
https://nvd.nist.gov/vuln/detail/CVE-2004-0827
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0829">
    <Details source="Mitre" xml:lang="en:us">
smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2.
    </Details>
    <Statement xml:lang="en:us">
We do not class this as a security issue; this can only cause a denial of service for the attacker.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0829
https://nvd.nist.gov/vuln/detail/CVE-2004-0829
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0832">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617307" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617307" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:462">RHSA-2004:462</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0832
https://nvd.nist.gov/vuln/detail/CVE-2004-0832
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0835">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-23T00:00:00</PublicDate>
    <Bugzilla id="1617308" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617308" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:611">RHSA-2004:611</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0835
https://nvd.nist.gov/vuln/detail/CVE-2004-0835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0836">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-06-04T00:00:00</PublicDate>
    <Bugzilla id="1617309" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617309" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:611">RHSA-2004:611</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0836
https://nvd.nist.gov/vuln/detail/CVE-2004-0836
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0837">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-01-15T00:00:00</PublicDate>
    <Bugzilla id="1617310" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617310" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:611">RHSA-2004:611</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0837
https://nvd.nist.gov/vuln/detail/CVE-2004-0837
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0882">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-15T00:00:00</PublicDate>
    <Bugzilla id="1617311" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617311" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small &quot;maximum data bytes&quot; value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:632">RHSA-2004:632</Advisory>
        <Package name="samba">samba-0:3.0.7-1.3E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0882
https://nvd.nist.gov/vuln/detail/CVE-2004-0882
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0883">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617312" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617312" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0883
https://nvd.nist.gov/vuln/detail/CVE-2004-0883
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0884">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-07T00:00:00</PublicDate>
    <Bugzilla id="1617313" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617313" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:546">RHSA-2004:546</Advisory>
        <Package name="cyrus-sasl">cyrus-sasl-0:2.1.15-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0884
https://nvd.nist.gov/vuln/detail/CVE-2004-0884
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0885">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-05T00:00:00</PublicDate>
    <Bugzilla id="430637" url="https://bugzilla.redhat.com/show_bug.cgi?id=430637" xml:lang="en:us">
mod_ssl SSLCipherSuite bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the &quot;SSLCipherSuite&quot; directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:562">RHSA-2004:562</Advisory>
        <Package name="httpd">httpd-0:2.0.46-44.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:653">RHSA-2004:653</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0885
https://nvd.nist.gov/vuln/detail/CVE-2004-0885
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0886">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-13T00:00:00</PublicDate>
    <Bugzilla id="1617314" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617314" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:577">RHSA-2004:577</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-20.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:021">RHSA-2005:021</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:354">RHSA-2005:354</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0886
https://nvd.nist.gov/vuln/detail/CVE-2004-0886
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0888">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-21T00:00:00</PublicDate>
    <Bugzilla id="1617315" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617315" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:543">RHSA-2004:543</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:592">RHSA-2004:592</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:354">RHSA-2005:354</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:066">RHSA-2005:066</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0888
https://nvd.nist.gov/vuln/detail/CVE-2004-0888
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0891">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617316" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617316" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an &quot;unexpected sequence of MSNSLP messages&quot; that results in an unbounded copy operation that writes to the wrong buffer.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0891
https://nvd.nist.gov/vuln/detail/CVE-2004-0891
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0902">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-04T00:00:00</PublicDate>
    <Bugzilla id="1617317" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617317" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the &quot;Send page&quot; functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0902
https://nvd.nist.gov/vuln/detail/CVE-2004-0902
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0903">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-08-29T00:00:00</PublicDate>
    <Bugzilla id="1617318" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617318" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to execute arbitrary code via malformed VCard attachments that are not properly handled when previewing a message.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0903
https://nvd.nist.gov/vuln/detail/CVE-2004-0903
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0904">
    <PublicDate>2004-08-27T00:00:00</PublicDate>
    <Bugzilla id="1617319" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617319" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0904
https://nvd.nist.gov/vuln/detail/CVE-2004-0904
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0905">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-11T00:00:00</PublicDate>
    <Bugzilla id="1617320" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617320" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0905
https://nvd.nist.gov/vuln/detail/CVE-2004-0905
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0906">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-02-26T00:00:00</PublicDate>
    <Bugzilla id="1617321" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617321" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0906
https://nvd.nist.gov/vuln/detail/CVE-2004-0906
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0908">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-08-31T00:00:00</PublicDate>
    <Bugzilla id="1617322" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617322" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0908
https://nvd.nist.gov/vuln/detail/CVE-2004-0908
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0914">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="430516" url="https://bugzilla.redhat.com/show_bug.cgi?id=430516" xml:lang="en:us">
openmotif21 stack overflows in libxpm
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE's content decisions.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-4.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:537">RHSA-2004:537</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:612">RHSA-2004:612</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-78.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:610">RHSA-2004:610</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:610">RHSA-2004:610</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:610">RHSA-2004:610</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:610">RHSA-2004:610</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:004">RHSA-2005:004</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0914
https://nvd.nist.gov/vuln/detail/CVE-2004-0914
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0918">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-11T00:00:00</PublicDate>
    <Bugzilla id="453211" url="https://bugzilla.redhat.com/show_bug.cgi?id=453211" xml:lang="en:us">
Squid SNMP DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:591">RHSA-2004:591</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0918
https://nvd.nist.gov/vuln/detail/CVE-2004-0918
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0923">
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617323" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617323" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CUPS 1.1.20 and earlier records authentication information for a device URI in the error_log file, which allows local users to obtain user names and passwords.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:543">RHSA-2004:543</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0923
https://nvd.nist.gov/vuln/detail/CVE-2004-0923
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0930">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-11-08T00:00:00</PublicDate>
    <Bugzilla id="1617324" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617324" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:632">RHSA-2004:632</Advisory>
        <Package name="samba">samba-0:3.0.7-1.3E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0930
https://nvd.nist.gov/vuln/detail/CVE-2004-0930
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0938">
    <PublicDate>2004-09-20T00:00:00</PublicDate>
    <Bugzilla id="1617325" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617325" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:609">RHSA-2004:609</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-1.RHEL3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0938
https://nvd.nist.gov/vuln/detail/CVE-2004-0938
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0940">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-21T00:00:00</PublicDate>
    <Bugzilla id="430526" url="https://bugzilla.redhat.com/show_bug.cgi?id=430526" xml:lang="en:us">
httpd mod_include SSI overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:600">RHSA-2004:600</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:653">RHSA-2004:653</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0940
https://nvd.nist.gov/vuln/detail/CVE-2004-0940
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0941">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="175413" url="https://bugzilla.redhat.com/show_bug.cgi?id=175413" xml:lang="en:us">
gd: additional overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the gd graphics library (libgd) 2.0.21 and earlier may allow remote attackers to execute arbitrary code via malformed image files that trigger the overflows due to improper calls to the gdMalloc function, a different set of vulnerabilities than CVE-2004-0990.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:638">RHSA-2004:638</Advisory>
        <Package name="gd">gd-0:1.8.4-12.3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0194">RHSA-2006:0194</Advisory>
        <Package name="gd">gd-0:2.0.28-4.4E.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0941
https://nvd.nist.gov/vuln/detail/CVE-2004-0941
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0942">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-01T00:00:00</PublicDate>
    <Bugzilla id="1617326" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617326" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:562">RHSA-2004:562</Advisory>
        <Package name="httpd">httpd-0:2.0.46-44.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0942
https://nvd.nist.gov/vuln/detail/CVE-2004-0942
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0946">
    <PublicDate>2004-11-22T00:00:00</PublicDate>
    <Bugzilla id="1617327" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617327" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conversion, which leads to a stack-based buffer overflow and allows remote attackers to execute arbitrary code via a crafted NFS request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:583">RHSA-2004:583</Advisory>
        <Package name="nfs-utils">nfs-utils-0:1.0.6-33EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0946
https://nvd.nist.gov/vuln/detail/CVE-2004-0946
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0947">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-09T00:00:00</PublicDate>
    <Bugzilla id="1617328" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617328" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in unarj before 2.63a-r2 allows remote attackers to execute arbitrary code via an arj archive that contains long filenames.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0947
https://nvd.nist.gov/vuln/detail/CVE-2004-0947
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0949">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617329" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617329" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0949
https://nvd.nist.gov/vuln/detail/CVE-2004-0949
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0957">
    <PublicDate>2004-05-29T00:00:00</PublicDate>
    <Bugzilla id="1617330" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617330" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a &quot;_&quot; (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:611">RHSA-2004:611</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:597">RHSA-2004:597</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0957
https://nvd.nist.gov/vuln/detail/CVE-2004-0957
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0958">
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617331" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617331" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
php_variables.c in PHP before 5.0.2 allows remote attackers to read sensitive memory contents via (1) GET, (2) POST, or (3) COOKIE GPC variables that end in an open bracket character, which causes PHP to calculate an incorrect string length.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:687">RHSA-2004:687</Advisory>
        <Package name="php">php-0:4.3.2-19.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0958
https://nvd.nist.gov/vuln/detail/CVE-2004-0958
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0959">
    <PublicDate>2004-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617332" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617332" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the &quot;$_FILES&quot; array to be modified.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:687">RHSA-2004:687</Advisory>
        <Package name="php">php-0:4.3.2-19.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0959
https://nvd.nist.gov/vuln/detail/CVE-2004-0959
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0960">
    <PublicDate>2004-09-20T00:00:00</PublicDate>
    <Bugzilla id="1617333" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617333" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:609">RHSA-2004:609</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-1.RHEL3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0960
https://nvd.nist.gov/vuln/detail/CVE-2004-0960
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0961">
    <PublicDate>2004-09-20T00:00:00</PublicDate>
    <Bugzilla id="1617334" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617334" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:609">RHSA-2004:609</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-1.RHEL3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0961
https://nvd.nist.gov/vuln/detail/CVE-2004-0961
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0967">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="140074" url="https://bugzilla.redhat.com/show_bug.cgi?id=140074" xml:lang="en:us">
temporary file vulnerabilities in various ghostscript scripts.
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) pj-gs.sh, (2) ps2epsi, (3) pv.sh, and (4) sysvlp.sh scripts in the ESP Ghostscript (espgs) package in Trustix Secure Linux 1.5 through 2.1, and other operating systems, allow local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:081">RHSA-2005:081</Advisory>
        <Package name="ghostscript">ghostscript-0:7.05-32.1.10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0967
https://nvd.nist.gov/vuln/detail/CVE-2004-0967
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0968">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617335" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617335" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:586">RHSA-2004:586</Advisory>
        <Package name="glibc">glibc-0:2.3.2-95.30</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0968
https://nvd.nist.gov/vuln/detail/CVE-2004-0968
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0971">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617336" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617336" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:012">RHSA-2005:012</Advisory>
        <Package name="krb5">krb5-0:1.2.7-38</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0971
https://nvd.nist.gov/vuln/detail/CVE-2004-0971
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0972">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617337" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617337" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The lvmcreate_initrd script in the lvm package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:232">RHBA-2004:232</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:232">RHBA-2004:232</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:232">RHBA-2004:232</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2004-09-01T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:232">RHBA-2004:232</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0972
https://nvd.nist.gov/vuln/detail/CVE-2004-0972
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0975">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617338" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617338" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0975
https://nvd.nist.gov/vuln/detail/CVE-2004-0975
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0976">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617339" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617339" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple scripts in the perl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140058

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:881">RHSA-2005:881</Advisory>
        <Package name="perl">perl-2:5.8.0-90.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0976
https://nvd.nist.gov/vuln/detail/CVE-2004-0976
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0977">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-09-30T00:00:00</PublicDate>
    <Bugzilla id="1617340" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617340" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:489">RHSA-2004:489</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.8-2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0977
https://nvd.nist.gov/vuln/detail/CVE-2004-0977
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0981">
    <PublicDate>2004-10-06T00:00:00</PublicDate>
    <Bugzilla id="1617341" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617341" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the EXIF parsing routine in ImageMagick before 6.1.0 allows remote attackers to execute arbitrary code via a certain image file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:636">RHSA-2004:636</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0981
https://nvd.nist.gov/vuln/detail/CVE-2004-0981
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0983">
    <PublicDate>2004-11-08T00:00:00</PublicDate>
    <Bugzilla id="1617342" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617342" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:635">RHSA-2004:635</Advisory>
        <Package name="ruby">ruby-0:1.6.8-9.EL3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0983
https://nvd.nist.gov/vuln/detail/CVE-2004-0983
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0989">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-26T00:00:00</PublicDate>
    <Bugzilla id="430645" url="https://bugzilla.redhat.com/show_bug.cgi?id=430645" xml:lang="en:us">
libxml2 various overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:615">RHSA-2004:615</Advisory>
        <Package name="libxml2">libxml2-0:2.5.10-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:650">RHSA-2004:650</Advisory>
        <Package name="libxml">libxml-1:1.8.17-9.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0989
https://nvd.nist.gov/vuln/detail/CVE-2004-0989
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0990">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-26T00:00:00</PublicDate>
    <Bugzilla id="1617343" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617343" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:638">RHSA-2004:638</Advisory>
        <Package name="gd">gd-0:1.8.4-12.3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0990
https://nvd.nist.gov/vuln/detail/CVE-2004-0990
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-0996">
    <Details source="Mitre" xml:lang="en:us">
main.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. cscope packages shipped with Red Hat Enterprise Linux 3, 4, and 5 contain a backported patch since their first release.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-0996
https://nvd.nist.gov/vuln/detail/CVE-2004-0996
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1002">
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.
    </Details>
    <Statement xml:lang="en:us">
This issue is only will only cause a denial of service on the connection the attacker is using.  It therefore is not a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1002
https://nvd.nist.gov/vuln/detail/CVE-2004-1002
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1004">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-14T00:00:00</PublicDate>
    <Bugzilla id="1617344" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617344" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1004
https://nvd.nist.gov/vuln/detail/CVE-2004-1004
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1005">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-14T00:00:00</PublicDate>
    <Bugzilla id="1617345" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617345" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1005
https://nvd.nist.gov/vuln/detail/CVE-2004-1005
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1006">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-11-02T00:00:00</PublicDate>
    <Bugzilla id="1617346" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617346" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code via certain DNS messages, a different vulnerability than CVE-2002-0702.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:212">RHSA-2005:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:212">RHSA-2005:212</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:212">RHSA-2005:212</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1006
https://nvd.nist.gov/vuln/detail/CVE-2004-1006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1009">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617347" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617347" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1009
https://nvd.nist.gov/vuln/detail/CVE-2004-1009
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1010">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617348" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617348" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:634">RHSA-2004:634</Advisory>
        <Package name="zip">zip-0:2.3-16.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1010
https://nvd.nist.gov/vuln/detail/CVE-2004-1010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1014">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-01T00:00:00</PublicDate>
    <Bugzilla id="1617349" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617349" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:583">RHSA-2004:583</Advisory>
        <Package name="nfs-utils">nfs-utils-0:1.0.6-33EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:014">RHSA-2005:014</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1014
https://nvd.nist.gov/vuln/detail/CVE-2004-1014
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1016">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-08T00:00:00</PublicDate>
    <Bugzilla id="1617350" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617350" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1016
https://nvd.nist.gov/vuln/detail/CVE-2004-1016
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1017">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-11-26T00:00:00</PublicDate>
    <Bugzilla id="1617351" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617351" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;overflows&quot; in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1017
https://nvd.nist.gov/vuln/detail/CVE-2004-1017
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1018">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617352" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617352" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer handling errors in PHP before 4.3.10 allow attackers to bypass safe mode restrictions, cause a denial of service, or execute arbitrary code via (1) a negative offset value to the shmop_write function, (2) an &quot;integer overflow/underflow&quot; in the pack function, or (3) an &quot;integer overflow/underflow&quot; in the unpack function.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:687">RHSA-2004:687</Advisory>
        <Package name="php">php-0:4.3.2-19.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:032">RHSA-2005:032</Advisory>
        <Package name="php">php-0:4.3.9-3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1018
https://nvd.nist.gov/vuln/detail/CVE-2004-1018
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1019">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617353" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617353" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger &quot;information disclosure, double-free and negative reference index array underflow&quot; results.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:687">RHSA-2004:687</Advisory>
        <Package name="php">php-0:4.3.2-19.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:032">RHSA-2005:032</Advisory>
        <Package name="php">php-0:4.3.9-3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:031">RHSA-2005:031</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1019
https://nvd.nist.gov/vuln/detail/CVE-2004-1019
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1020">
    <Details source="Mitre" xml:lang="en:us">
The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed.  There are no known uses of this function which could allow a remote attacker to execute arbitrary code.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1020
https://nvd.nist.gov/vuln/detail/CVE-2004-1020
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1025">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617354" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617354" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:651">RHSA-2004:651</Advisory>
        <Package name="imlib">imlib-1:1.9.13-13.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1025
https://nvd.nist.gov/vuln/detail/CVE-2004-1025
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1026">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-09-16T00:00:00</PublicDate>
    <Bugzilla id="1617355" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617355" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:651">RHSA-2004:651</Advisory>
        <Package name="imlib">imlib-1:1.9.13-13.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1026
https://nvd.nist.gov/vuln/detail/CVE-2004-1026
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1027">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-09T00:00:00</PublicDate>
    <Bugzilla id="1617356" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617356" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the -x (extract) command line option in unarj allows remote attackers to overwrite arbitrary files via an arj archive with filenames that contain .. (dot dot) sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:007">RHSA-2005:007</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1027
https://nvd.nist.gov/vuln/detail/CVE-2004-1027
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1036">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617357" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617357" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the decoding of encoded text in certain headers in mime.php for SquirrelMail 1.4.3a and earlier, and 1.5.1-cvs before 23rd October 2004, allows remote attackers to execute arbitrary web script or HTML.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:654">RHSA-2004:654</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-7.EL3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1036
https://nvd.nist.gov/vuln/detail/CVE-2004-1036
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1051">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-11T00:00:00</PublicDate>
    <Bugzilla id="139478" url="https://bugzilla.redhat.com/show_bug.cgi?id=139478" xml:lang="en:us">
CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using &quot;()&quot; style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1051
https://nvd.nist.gov/vuln/detail/CVE-2004-1051
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1056">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-14T00:00:00</PublicDate>
    <Bugzilla id="1617358" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617358" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1056
https://nvd.nist.gov/vuln/detail/CVE-2004-1056
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1057">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-07T00:00:00</PublicDate>
    <Bugzilla id="1617359" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617359" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1057
https://nvd.nist.gov/vuln/detail/CVE-2004-1057
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1058">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-08-23T00:00:00</PublicDate>
    <Bugzilla id="1617360" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617360" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1058
https://nvd.nist.gov/vuln/detail/CVE-2004-1058
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1063">
    <Details source="Mitre" xml:lang="en:us">
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.
    </Details>
    <Statement xml:lang="en:us">
We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1063
https://nvd.nist.gov/vuln/detail/CVE-2004-1063
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1064">
    <Details source="Mitre" xml:lang="en:us">
The safe mode checks in PHP 4.x to 4.3.9 and PHP 5.x to 5.0.2 truncate the file path before passing the data to the realpath function, which could allow attackers to bypass safe mode.  NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute.  This candidate may change significantly in the future as a result of further discussion.
    </Details>
    <Statement xml:lang="en:us">
We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1064
https://nvd.nist.gov/vuln/detail/CVE-2004-1064
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1065">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617361" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617361" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:687">RHSA-2004:687</Advisory>
        <Package name="php">php-0:4.3.2-19.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:032">RHSA-2005:032</Advisory>
        <Package name="php">php-0:4.3.9-3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1065
https://nvd.nist.gov/vuln/detail/CVE-2004-1065
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1068">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-15T00:00:00</PublicDate>
    <Bugzilla id="1617362" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617362" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A &quot;missing serialization&quot; error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1068
https://nvd.nist.gov/vuln/detail/CVE-2004-1068
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1070">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617363" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617363" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1070
https://nvd.nist.gov/vuln/detail/CVE-2004-1070
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1071">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617364" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617364" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1071
https://nvd.nist.gov/vuln/detail/CVE-2004-1071
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1072">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617365" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617365" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-05-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:275">RHSA-2005:275</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1072
https://nvd.nist.gov/vuln/detail/CVE-2004-1072
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1073">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617366" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617366" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:549">RHSA-2004:549</Advisory>
        <Package name="kernel">kernel-0:2.4.21-20.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:505">RHSA-2004:505</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:504">RHSA-2004:504</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1073
https://nvd.nist.gov/vuln/detail/CVE-2004-1073
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1074">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-11-11T00:00:00</PublicDate>
    <Bugzilla id="1617367" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617367" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The binfmt functionality in the Linux kernel, when &quot;memory overcommit&quot; is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:043">RHSA-2005:043</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1074
https://nvd.nist.gov/vuln/detail/CVE-2004-1074
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1090">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617368" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617368" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via &quot;a corrupt section header.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1090
https://nvd.nist.gov/vuln/detail/CVE-2004-1090
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1091">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617369" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617369" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by triggering a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1091
https://nvd.nist.gov/vuln/detail/CVE-2004-1091
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1093">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617370" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617370" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via &quot;use of already freed memory.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1093
https://nvd.nist.gov/vuln/detail/CVE-2004-1093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1125">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-21T00:00:00</PublicDate>
    <Bugzilla id="1617371" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617371" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:013">RHSA-2005:013</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:018">RHSA-2005:018</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:354">RHSA-2005:354</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:026">RHSA-2005:026</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:034">RHSA-2005:034</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:057">RHSA-2005:057</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:066">RHSA-2005:066</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1125
https://nvd.nist.gov/vuln/detail/CVE-2004-1125
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1137">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-14T00:00:00</PublicDate>
    <Bugzilla id="1617372" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617372" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1137
https://nvd.nist.gov/vuln/detail/CVE-2004-1137
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1138">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617374" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617374" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:010">RHSA-2005:010</Advisory>
        <Package name="vim">vim-1:6.3.046-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:036">RHSA-2005:036</Advisory>
        <Package name="vim">vim-1:6.3.046-0.40E.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1138
https://nvd.nist.gov/vuln/detail/CVE-2004-1138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1139">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617375" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617375" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1139
https://nvd.nist.gov/vuln/detail/CVE-2004-1139
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1140">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617376" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617376" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (application hang) and possibly fill available disk space via an invalid RTP timestamp.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1140
https://nvd.nist.gov/vuln/detail/CVE-2004-1140
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1141">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617377" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617377" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTTP dissector in Ethereal 0.10.1 through 0.10.7 allows remote attackers to cause a denial of service (application crash) via a certain packet that causes the dissector to access previously-freed memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1141
https://nvd.nist.gov/vuln/detail/CVE-2004-1141
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1142">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617378" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617378" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1142
https://nvd.nist.gov/vuln/detail/CVE-2004-1142
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1144">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-22T00:00:00</PublicDate>
    <Bugzilla id="1617379" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617379" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1144
https://nvd.nist.gov/vuln/detail/CVE-2004-1144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1145">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-20T00:00:00</PublicDate>
    <Bugzilla id="1617380" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617380" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:065">RHSA-2005:065</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1145
https://nvd.nist.gov/vuln/detail/CVE-2004-1145
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1152">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-12T00:00:00</PublicDate>
    <Bugzilla id="1617381" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617381" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:674">RHSA-2004:674</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1152
https://nvd.nist.gov/vuln/detail/CVE-2004-1152
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1154">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-16T00:00:00</PublicDate>
    <Bugzilla id="1617382" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617382" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:670">RHSA-2004:670</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:681">RHSA-2004:681</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:020">RHSA-2005:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:681">RHSA-2004:681</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:020">RHSA-2005:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:681">RHSA-2004:681</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:020">RHSA-2005:020</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2004-12-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:681">RHSA-2004:681</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:020">RHSA-2005:020</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1154
https://nvd.nist.gov/vuln/detail/CVE-2004-1154
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1156">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-08T00:00:00</PublicDate>
    <Bugzilla id="1617383" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617383" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla before 1.7.6, and Firefox before 1.0.1, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the &quot;window injection&quot; vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1156
https://nvd.nist.gov/vuln/detail/CVE-2004-1156
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1158">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-08T00:00:00</PublicDate>
    <Bugzilla id="1617384" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617384" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the &quot;window injection&quot; vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1158
https://nvd.nist.gov/vuln/detail/CVE-2004-1158
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1165">
    <PublicDate>2004-12-05T00:00:00</PublicDate>
    <Bugzilla id="1617385" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617385" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline (&quot;%0a&quot;) before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:065">RHSA-2005:065</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1165
https://nvd.nist.gov/vuln/detail/CVE-2004-1165
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1170">
    <Details source="Mitre" xml:lang="en:us">
a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1170
https://nvd.nist.gov/vuln/detail/CVE-2004-1170
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1174">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617386" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617386" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by &quot;manipulating non-existing file handles.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1174
https://nvd.nist.gov/vuln/detail/CVE-2004-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1175">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617387" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617387" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fish.c in midnight commander allows remote attackers to execute arbitrary programs via &quot;insecure filename quoting,&quot; possibly using shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1175
https://nvd.nist.gov/vuln/detail/CVE-2004-1175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1176">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-13T00:00:00</PublicDate>
    <Bugzilla id="1617388" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617388" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:217">RHSA-2005:217</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1176
https://nvd.nist.gov/vuln/detail/CVE-2004-1176
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1177">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-10T00:00:00</PublicDate>
    <Bugzilla id="1617389" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617389" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of mailman shipped with Red Hat Enterprise Linux 2.1, 3, or 4.  In addition, we believe this issue does not apply to the 2.0.x versions of mailman due to setting of STEALTH_MODE
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:235">RHSA-2005:235</Advisory>
        <Package name="mailman">mailman-3:2.1.5-25.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:235">RHSA-2005:235</Advisory>
        <Package name="mailman">mailman-3:2.1.5-33.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1177
https://nvd.nist.gov/vuln/detail/CVE-2004-1177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1183">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-05T00:00:00</PublicDate>
    <Bugzilla id="1617390" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617390" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:019">RHSA-2005:019</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-22.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:035">RHSA-2005:035</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1183
https://nvd.nist.gov/vuln/detail/CVE-2004-1183
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1184">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617391" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617391" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:039">RHSA-2005:039</Advisory>
        <Package name="enscript">enscript-0:1.6.1-24.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:040">RHSA-2005:040</Advisory>
        <Package name="enscript">enscript-0:1.6.1-28.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1184
https://nvd.nist.gov/vuln/detail/CVE-2004-1184
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1185">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617392" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617392" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:039">RHSA-2005:039</Advisory>
        <Package name="enscript">enscript-0:1.6.1-24.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:040">RHSA-2005:040</Advisory>
        <Package name="enscript">enscript-0:1.6.1-28.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1185
https://nvd.nist.gov/vuln/detail/CVE-2004-1185
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1186">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617393" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617393" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:039">RHSA-2005:039</Advisory>
        <Package name="enscript">enscript-0:1.6.1-24.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:040">RHSA-2005:040</Advisory>
        <Package name="enscript">enscript-0:1.6.1-28.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1186
https://nvd.nist.gov/vuln/detail/CVE-2004-1186
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1189">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-21T00:00:00</PublicDate>
    <Bugzilla id="1617394" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617394" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a password change, does not properly track the password policy's history count and the maximum number of keys, which can cause an array index out-of-bounds error and may allow authenticated users to execute arbitrary code via a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:012">RHSA-2005:012</Advisory>
        <Package name="krb5">krb5-0:1.2.7-38</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:045">RHSA-2005:045</Advisory>
        <Package name="krb5">krb5-0:1.3.4-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1189
https://nvd.nist.gov/vuln/detail/CVE-2004-1189
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1190">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-30T00:00:00</PublicDate>
    <Bugzilla id="1617395" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617395" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to conduct unauthorized write activities to modify the firmware of associated SCSI devices.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1190
https://nvd.nist.gov/vuln/detail/CVE-2004-1190
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1234">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-04-08T00:00:00</PublicDate>
    <Bugzilla id="1617396" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617396" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1234
https://nvd.nist.gov/vuln/detail/CVE-2004-1234
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1235">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-06T00:00:00</PublicDate>
    <Bugzilla id="1617397" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617397" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:043">RHSA-2005:043</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1235
https://nvd.nist.gov/vuln/detail/CVE-2004-1235
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1236">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-12-23T00:00:00</PublicDate>
    <Bugzilla id="1617398" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617398" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:directory_server:6.21">
        <ProductName>Netscape Directory Server 6.21</ProductName>
        <ReleaseDate>2005-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:030">RHSA-2005:030</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1236
https://nvd.nist.gov/vuln/detail/CVE-2004-1236
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1237">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-09-10T00:00:00</PublicDate>
    <Bugzilla id="1617399" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617399" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:043">RHSA-2005:043</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1237
https://nvd.nist.gov/vuln/detail/CVE-2004-1237
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1267">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617400" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617400" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:013">RHSA-2005:013</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1267
https://nvd.nist.gov/vuln/detail/CVE-2004-1267
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1268">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617401" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617401" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:013">RHSA-2005:013</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1268
https://nvd.nist.gov/vuln/detail/CVE-2004-1268
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1269">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617402" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617402" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:013">RHSA-2005:013</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1269
https://nvd.nist.gov/vuln/detail/CVE-2004-1269
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1270">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617403" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617403" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:013">RHSA-2005:013</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1270
https://nvd.nist.gov/vuln/detail/CVE-2004-1270
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1287">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617404" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617404" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the error function in preproc.c for NASM 0.98.38 1.2 allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2005-1194.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:381">RHSA-2005:381</Advisory>
        <Package name="nasm">nasm-0:0.98.35-3.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:381">RHSA-2005:381</Advisory>
        <Package name="nasm">nasm-0:0.98.38-3.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1287
https://nvd.nist.gov/vuln/detail/CVE-2004-1287
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1296">
    <Details source="Mitre" xml:lang="en:us">
The (1) eqn2graph and (2) pic2graph scripts in groff 1.18.1 allow local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1296
https://nvd.nist.gov/vuln/detail/CVE-2004-1296
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1307">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-21T00:00:00</PublicDate>
    <Bugzilla id="1617405" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617405" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
This issue was resolved in all affected libtiff versions as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 via a patch for CVE-2004-0886.  For updates containing patches for CVE-2004-0886, see: https://rhn.redhat.com/errata/CVE-2004-0886.html
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:577">RHSA-2004:577</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-20.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:021">RHSA-2005:021</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1307
https://nvd.nist.gov/vuln/detail/CVE-2004-1307
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1308">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-21T00:00:00</PublicDate>
    <Bugzilla id="1617406" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617406" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in (1) tif_dirread.c and (2) tif_fax3.c for libtiff 3.5.7 and 3.7.0 allows remote attackers to execute arbitrary code via a TIFF file containing a TIFF_ASCII or TIFF_UNDEFINED directory entry with a -1 entry count, which leads to a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:019">RHSA-2005:019</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-22.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:021">RHSA-2005:021</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:035">RHSA-2005:035</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1308
https://nvd.nist.gov/vuln/detail/CVE-2004-1308
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1316">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-29T00:00:00</PublicDate>
    <Bugzilla id="1617407" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617407" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1316
https://nvd.nist.gov/vuln/detail/CVE-2004-1316
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1335">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-12-08T00:00:00</PublicDate>
    <Bugzilla id="1617408" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617408" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-12-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:689">RHSA-2004:689</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1335
https://nvd.nist.gov/vuln/detail/CVE-2004-1335
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1377">
    <Details source="Mitre" xml:lang="en:us">
The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1377
https://nvd.nist.gov/vuln/detail/CVE-2004-1377
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1380">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617409" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617409" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5 allows inactive (background) tabs to launch dialog boxes, which can allow remote attackers to spoof the dialog boxes from web sites in other windows and facilitate phishing attacks, aka the &quot;Dialog Box Spoofing Vulnerability.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1380
https://nvd.nist.gov/vuln/detail/CVE-2004-1380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1382">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-10-24T00:00:00</PublicDate>
    <Bugzilla id="1617410" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617410" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1382
https://nvd.nist.gov/vuln/detail/CVE-2004-1382
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1392">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-15T00:00:00</PublicDate>
    <Bugzilla id="1617411" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617411" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:405">RHSA-2005:405</Advisory>
        <Package name="php">php-0:4.3.2-23.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:406">RHSA-2005:406</Advisory>
        <Package name="php">php-0:4.3.9-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1392
https://nvd.nist.gov/vuln/detail/CVE-2004-1392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1453">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-08-17T00:00:00</PublicDate>
    <Bugzilla id="1617412" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617412" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:256">RHSA-2005:256</Advisory>
        <Package name="glibc">glibc-0:2.3.2-95.33</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:261">RHSA-2005:261</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1453
https://nvd.nist.gov/vuln/detail/CVE-2004-1453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1487">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-10T00:00:00</PublicDate>
    <Bugzilla id="1617413" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617413" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a &quot;..&quot; that resolves to the IP address of the malicious server, which bypasses wget's filtering for &quot;..&quot; sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-1.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-2.4E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1487
https://nvd.nist.gov/vuln/detail/CVE-2004-1487
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1488">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-10T00:00:00</PublicDate>
    <Bugzilla id="1617414" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617414" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-1.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-2.4E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1488
https://nvd.nist.gov/vuln/detail/CVE-2004-1488
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1613">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-18T00:00:00</PublicDate>
    <Bugzilla id="1617415" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617415" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1613
https://nvd.nist.gov/vuln/detail/CVE-2004-1613
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1653">
    <Details source="Mitre" xml:lang="en:us">
The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.
    </Details>
    <Statement xml:lang="en:us">
Permitting TCP forwarding is the expected and known default configuration. If it is not desired, it can disabled using the AllowTcpForwarding option in the /etc/ssh/sshd_config configuration file. However, only disabling TCP forwarding does not improve security unless users are also denied shell access. For more information, see man sshd_config.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1653
https://nvd.nist.gov/vuln/detail/CVE-2004-1653
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1717">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the psscan function in ps.c for gv (ghostview) allow remote attackers to execute arbitrary code via a Postscript file with a long (1) BoundingBox, (2) comment, (3) Orientation, (4) PageOrder, or (5) Pages value.
    </Details>
    <Statement xml:lang="en:us">
This CVE is a duplicate (rediscovery) of CVE-2002-0838
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1717
https://nvd.nist.gov/vuln/detail/CVE-2004-1717
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1761">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-22T00:00:00</PublicDate>
    <Bugzilla id="1617416" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617416" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Ethereal 0.8.13 to 0.10.2 allows attackers to cause a denial of service (segmentation fault) via a malformed color filter file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:136">RHSA-2004:136</Advisory>
        <Package name="ethereal">ethereal-0:0.10.3-0.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:linux:9">
        <ProductName>Red Hat Linux 9</ProductName>
        <ReleaseDate>2004-03-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:137">RHSA-2004:137</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1761
https://nvd.nist.gov/vuln/detail/CVE-2004-1761
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1772">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-06T00:00:00</PublicDate>
    <Bugzilla id="1617417" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617417" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-16.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-22.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1772
https://nvd.nist.gov/vuln/detail/CVE-2004-1772
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1773">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-10-01T00:00:00</PublicDate>
    <Bugzilla id="1617418" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617418" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-16.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-22.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1773
https://nvd.nist.gov/vuln/detail/CVE-2004-1773
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1808">
    <Details source="Mitre" xml:lang="en:us">
Extcompose in metamail does not verify the output file before writing to it, which allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team rated this issue as having low security impact. This issue affected Red Hat Enterprise Linux 2.1 but due to the low severity will not be fixed.  metamail was not shipped in Red Hat Enterprise Linux 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1808
https://nvd.nist.gov/vuln/detail/CVE-2004-1808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1834">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-20T00:00:00</PublicDate>
    <Bugzilla id="1617419" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617419" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_disk_cache in Apache 2.0 through 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2004-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2004:562">RHSA-2004:562</Advisory>
        <Package name="httpd">httpd-0:2.0.46-44.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1834
https://nvd.nist.gov/vuln/detail/CVE-2004-1834
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-1880">
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the back-bdb backend for OpenLDAP 2.1.12 and earlier allows remote attackers to cause a denial of service (memory consumption).
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-1880
https://nvd.nist.gov/vuln/detail/CVE-2004-1880
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2014">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-16T00:00:00</PublicDate>
    <Bugzilla id="1617420" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617420" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-1.30E.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:771">RHSA-2005:771</Advisory>
        <Package name="wget">wget-0:1.10.1-2.4E.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2014
https://nvd.nist.gov/vuln/detail/CVE-2004-2014
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2069">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-01-27T00:00:00</PublicDate>
    <Bugzilla id="1617421" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617421" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:550">RHSA-2005:550</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2069
https://nvd.nist.gov/vuln/detail/CVE-2004-2069
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2154">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-05T00:00:00</PublicDate>
    <Bugzilla id="1617422" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617422" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:571">RHSA-2005:571</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.29</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2154
https://nvd.nist.gov/vuln/detail/CVE-2004-2154
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2259">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-03-25T00:00:00</PublicDate>
    <Bugzilla id="1617423" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617423" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vsftpd before 1.2.2, when under heavy load, allows attackers to cause a denial of service (crash) via a SIGCHLD signal during a malloc or free call, which is not re-entrant.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2004-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:164">RHBA-2004:164</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2004-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2004:164">RHBA-2004:164</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2259
https://nvd.nist.gov/vuln/detail/CVE-2004-2259
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2300">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument.  NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. We did not ship snmpd setuid root in Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2300
https://nvd.nist.gov/vuln/detail/CVE-2004-2300
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2320">
    <Details source="Mitre" xml:lang="en:us">
The default configuration of BEA WebLogic Server and Express 8.1 SP2 and earlier, 7.0 SP4 and earlier, 6.1 through SP6, and 5.1 through SP13 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.
    </Details>
    <Statement xml:lang="en:us">
The Apache Software Foundation do not treat this as a security issue. A configuration change can be made to disable the ability to respond to HTTP TRACE requests if required.

For more information please see:
http://www.apacheweek.com/issues/03-01-24#news
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2320
https://nvd.nist.gov/vuln/detail/CVE-2004-2320
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2343">
    <Details source="Mitre" xml:lang="en:us">
Apache HTTP Server 2.0.47 and earlier allows local users to bypass .htaccess file restrictions, as specified in httpd.conf with directives such as Deny From All, by using an ErrorDocument directive. NOTE: the vendor has disputed this issue, since the .htaccess mechanism is only intended to restrict external web access, and a local user already has the privileges to perform the same operations without using ErrorDocument
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a security  issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2343
https://nvd.nist.gov/vuln/detail/CVE-2004-2343
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2392">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-06T00:00:00</PublicDate>
    <Bugzilla id="1617424" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617424" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libuser 0.51.7 allows attackers to cause a denial of service (crash or disk consumption) via unknown attack vectors, related to read failures and other bugs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:770">RHSA-2005:770</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:770">RHSA-2005:770</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:770">RHSA-2005:770</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:770">RHSA-2005:770</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2392
https://nvd.nist.gov/vuln/detail/CVE-2004-2392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2479">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-23T00:00:00</PublicDate>
    <Bugzilla id="1617425" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617425" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2479
https://nvd.nist.gov/vuln/detail/CVE-2004-2479
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2541">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2009-04-30T00:00:00</PublicDate>
    <Bugzilla id="490667" url="https://bugzilla.redhat.com/show_bug.cgi?id=490667" xml:lang="en:us">
cscope: multiple buffer overflows
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.1</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Cscope 15.5, and possibly multiple overflows, allows remote attackers to execute arbitrary code via a C file with a long #include line that is later browsed by the target.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-06-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1101">RHSA-2009:1101</Advisory>
        <Package name="cscope">cscope-0:15.5-16.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-06-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1101">RHSA-2009:1101</Advisory>
        <Package name="cscope">cscope-0:15.5-10.RHEL4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-06-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1102">RHSA-2009:1102</Advisory>
        <Package name="cscope">cscope-0:15.5-15.1.el5_3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2541
https://nvd.nist.gov/vuln/detail/CVE-2004-2541
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2546">
    <Details source="Mitre" xml:lang="en:us">
Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 3, or 4.  Red Hat Enterprise Linux 2.1 shipped with a version of Samba prior to 3.0.6, but we verified by code audit that it is not affected by this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2546
https://nvd.nist.gov/vuln/detail/CVE-2004-2546
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2654">
    <Details source="Mitre" xml:lang="en:us">
The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference.  NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue only affected 2.5 STABLE4 and 2.5 STABLE5 versions of Squid and does not affect the versions of Squid distributed with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2654
https://nvd.nist.gov/vuln/detail/CVE-2004-2654
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2655">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-05-12T00:00:00</PublicDate>
    <Bugzilla id="1617427" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617427" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms, does not release the keyboard focus when xscreensaver starts, which causes the password to be entered into the active window when the user unlocks the screen.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0498">RHSA-2006:0498</Advisory>
        <Package name="xscreensaver">xscreensaver-1:4.10-20</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2655
https://nvd.nist.gov/vuln/detail/CVE-2004-2655
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2660">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-10-28T00:00:00</PublicDate>
    <Bugzilla id="1617428" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617428" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2660
https://nvd.nist.gov/vuln/detail/CVE-2004-2660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2680">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-16T00:00:00</PublicDate>
    <Bugzilla id="231065" url="https://bugzilla.redhat.com/show_bug.cgi?id=231065" xml:lang="en:us">
mod_python arbitrary data disclosure flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team has rated this issue as having low security impact. We no longer plan to fix this flaw in Red Hat Enterprise Linux 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>mod_python</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mod_python</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2680
https://nvd.nist.gov/vuln/detail/CVE-2004-2680
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2731">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-31T00:00:00</PublicDate>
    <Bugzilla id="324791" url="https://bugzilla.redhat.com/show_bug.cgi?id=324791" xml:lang="en:us">
kernel: interger overflows in Sbus PROM driver
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The Linux kernel as shipped with with Red Hat Enterprise Linux 2.1, 3, 4 and 5 did not include the Sbus PROM module and therefore are not affected by this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2731
https://nvd.nist.gov/vuln/detail/CVE-2004-2731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2760">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-04-12T00:00:00</PublicDate>
    <Bugzilla id="457832" url="https://bugzilla.redhat.com/show_bug.cgi?id=457832" xml:lang="en:us">
openssh information disclosure
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for remote attackers to guess the password by observing the connection state, a different vulnerability than CVE-2003-0190.  NOTE: it could be argued that in most environments, this does not cross privilege boundaries without requiring leverage of a separate vulnerability.
    </Details>
    <Statement xml:lang="en:us">
The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2760
https://nvd.nist.gov/vuln/detail/CVE-2004-2760
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2761">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2008-12-30T00:00:00</PublicDate>
    <Bugzilla id="648886" url="https://bugzilla.redhat.com/show_bug.cgi?id=648886" xml:lang="en:us">
MD5: MD5 Message-Digest Algorithm is not collision resistant
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
    </Details>
    <Statement xml:lang="en:us">
Please see https://access.redhat.com/solutions/15378
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0837">RHSA-2010:0837</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-21.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0837">RHSA-2010:0837</Advisory>
        <Package name="rhpki-common">rhpki-common-0:7.3.0-41.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0837">RHSA-2010:0837</Advisory>
        <Package name="rhpki-util">rhpki-util-0:7.3.0-21.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:8::el5">
        <ProductName>Red Hat Certificate System 8</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0838">RHSA-2010:0838</Advisory>
        <Package name="pki-ca">pki-ca-0:8.0.7-1.el5pki</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:8::el5">
        <ProductName>Red Hat Certificate System 8</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0838">RHSA-2010:0838</Advisory>
        <Package name="pki-common">pki-common-0:8.0.6-2.el5pki</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:8::el5">
        <ProductName>Red Hat Certificate System 8</ProductName>
        <ReleaseDate>2010-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0838">RHSA-2010:0838</Advisory>
        <Package name="pki-util">pki-util-0:8.0.5-1.el5pki</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2761
https://nvd.nist.gov/vuln/detail/CVE-2004-2761
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2771">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2014-12-16T00:00:00</PublicDate>
    <Bugzilla id="1162783" url="https://bugzilla.redhat.com/show_bug.cgi?id=1162783" xml:lang="en:us">
mailx: command execution flaw
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>3.6</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:P/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-78</CWE>
    <Details source="Mitre" xml:lang="en:us">
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters (CVE-2004-2771) and the direct command execution functionality (CVE-2014-7844).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2014-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2014:1999">RHSA-2014:1999</Advisory>
        <Package name="mailx">mailx-0:12.4-8.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2014-12-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2014:1999">RHSA-2014:1999</Advisory>
        <Package name="mailx">mailx-0:12.5-12.el7_0</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>mailx</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2771
https://nvd.nist.gov/vuln/detail/CVE-2004-2771
    </References>
</Vulnerability>

<Vulnerability name="CVE-2004-2779">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-31T00:00:00</PublicDate>
    <Bugzilla id="1561983" url="https://bugzilla.redhat.com/show_bug.cgi?id=1561983" xml:lang="en:us">
libid3tag: id3_utf16_deserialize() misparses ID3v2 tags with an odd number of bytes resulting in an endless loop
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>3.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-400</CWE>
    <Details source="Mitre" xml:lang="en:us">
id3_utf16_deserialize() in utf16.c in libid3tag through 0.15.1b misparses ID3v2 tags encoded in UTF-16 with an odd number of bytes, triggering an endless loop allocating memory until an OOM condition is reached, leading to denial-of-service (DoS).
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libid3tag</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Affected</FixState>
        <PackageName>libid3tag</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2004-2779
https://nvd.nist.gov/vuln/detail/CVE-2004-2779
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0001">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-12T00:00:00</PublicDate>
    <Bugzilla id="1617429" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617429" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:016">RHSA-2005:016</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0001
https://nvd.nist.gov/vuln/detail/CVE-2005-0001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0003">
    <PublicDate>2004-12-17T00:00:00</PublicDate>
    <Bugzilla id="1617430" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617430" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:043">RHSA-2005:043</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:017">RHSA-2005:017</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0003
https://nvd.nist.gov/vuln/detail/CVE-2005-0003
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0004">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1386138" url="https://bugzilla.redhat.com/show_bug.cgi?id=1386138" xml:lang="en:us">
mysql: mysqlaccess creates/overwrite files on the system
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>7.9</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-266</CWE>
    <Details source="Mitre" xml:lang="en:us">
The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql55-mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:5::el6">
        <ProductName>Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb-galera</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:6">
        <ProductName>Red Hat Enterprise Linux OpenStack Platform 6 (Juno)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb-galera</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:7">
        <ProductName>Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb-galera</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:8">
        <ProductName>Red Hat OpenStack Platform 8 (Liberty)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb-galera</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:2">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mariadb55-mariadb</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:2">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mysql55-mysql</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:2">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rh-mariadb100-mariadb</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:2">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rh-mariadb101-mariadb</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:2">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rh-mysql56-mysql</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0004
https://nvd.nist.gov/vuln/detail/CVE-2005-0004
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0005">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-17T00:00:00</PublicDate>
    <Bugzilla id="1617431" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617431" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in psd.c for ImageMagick 6.1.0, 6.1.7, and possibly earlier versions allows remote attackers to execute arbitrary code via a .PSD image file with a large number of layers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:071">RHSA-2005:071</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0005
https://nvd.nist.gov/vuln/detail/CVE-2005-0005
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0006">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617432" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617432" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The COPS dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (infinite loop).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0006
https://nvd.nist.gov/vuln/detail/CVE-2005-0006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0007">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617433" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617433" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the DLSw dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash from assertion).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0007
https://nvd.nist.gov/vuln/detail/CVE-2005-0007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0008">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617434" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617434" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the DNP dissector in Ethereal 0.10.5 through 0.10.8 allows remote attackers to cause &quot;memory corruption.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0008
https://nvd.nist.gov/vuln/detail/CVE-2005-0008
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0009">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617435" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617435" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the Gnutella dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0009
https://nvd.nist.gov/vuln/detail/CVE-2005-0009
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0010">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617437" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617437" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the MMSE dissector in Ethereal 0.10.4 through 0.10.8 allows remote attackers to cause a denial of service by triggering a free of statically allocated memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0010
https://nvd.nist.gov/vuln/detail/CVE-2005-0010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0013">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-30T00:00:00</PublicDate>
    <Bugzilla id="1617438" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617438" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nwclient.c in ncpfs before 2.2.6 does not drop root privileges before executing utilities using the NetWare client functions, which allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:371">RHSA-2005:371</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:371">RHSA-2005:371</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:371">RHSA-2005:371</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0013
https://nvd.nist.gov/vuln/detail/CVE-2005-0013
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0021">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617439" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617439" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:025">RHSA-2005:025</Advisory>
        <Package name="exim">exim-0:4.43-1.RHEL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0021
https://nvd.nist.gov/vuln/detail/CVE-2005-0021
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0022">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617440" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617440" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:025">RHSA-2005:025</Advisory>
        <Package name="exim">exim-0:4.43-1.RHEL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0022
https://nvd.nist.gov/vuln/detail/CVE-2005-0022
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0064">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-18T00:00:00</PublicDate>
    <Bugzilla id="1617441" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617441" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:049">RHSA-2005:049</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:059">RHSA-2005:059</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:026">RHSA-2005:026</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:034">RHSA-2005:034</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:057">RHSA-2005:057</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:066">RHSA-2005:066</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0064
https://nvd.nist.gov/vuln/detail/CVE-2005-0064
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0069">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-09T00:00:00</PublicDate>
    <Bugzilla id="1617442" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617442" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:122">RHSA-2005:122</Advisory>
        <Package name="vim">vim-1:6.3.046-0.30E.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:036">RHSA-2005:036</Advisory>
        <Package name="vim">vim-1:6.3.046-0.40E.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0069
https://nvd.nist.gov/vuln/detail/CVE-2005-0069
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0075">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-22T00:00:00</PublicDate>
    <Bugzilla id="1617443" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617443" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
prefs.php in SquirrelMail before 1.4.4, with register_globals enabled, allows remote attackers to inject local code into the SquirrelMail code via custom preference handlers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:135">RHSA-2005:135</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:099">RHSA-2005:099</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0075
https://nvd.nist.gov/vuln/detail/CVE-2005-0075
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0077">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-25T00:00:00</PublicDate>
    <Bugzilla id="1617444" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617444" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:069">RHSA-2005:069</Advisory>
        <Package name="perl-DBI">perl-DBI-0:1.32-9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:072">RHSA-2005:072</Advisory>
        <Package name="perl-DBI">perl-DBI-0:1.40-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0077
https://nvd.nist.gov/vuln/detail/CVE-2005-0077
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0078">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-26T00:00:00</PublicDate>
    <Bugzilla id="1617445" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617445" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:009">RHSA-2005:009</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0078
https://nvd.nist.gov/vuln/detail/CVE-2005-0078
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0084">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617446" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617446" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8 allows remote attackers to execute arbitrary code via a crafted packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:011">RHSA-2005:011</Advisory>
        <Package name="ethereal">ethereal-0:0.10.9-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0084
https://nvd.nist.gov/vuln/detail/CVE-2005-0084
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0085">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-03T00:00:00</PublicDate>
    <Bugzilla id="1617447" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617447" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of htdig as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144263
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:090">RHSA-2005:090</Advisory>
        <Package name="htdig">htdig-3:3.2.0b6-3.40.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0085
https://nvd.nist.gov/vuln/detail/CVE-2005-0085
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0086">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617448" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617448" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-01-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:068">RHSA-2005:068</Advisory>
        <Package name="less">less-0:378-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0086
https://nvd.nist.gov/vuln/detail/CVE-2005-0086
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0087">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617449" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617449" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier for attackers to execute arbitrary code if there are other vulnerabilities in the library.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:033">RHSA-2005:033</Advisory>
        <Package name="alsa-lib">alsa-lib-0:1.0.6-5.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0087
https://nvd.nist.gov/vuln/detail/CVE-2005-0087
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0088">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617450" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617450" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:104">RHSA-2005:104</Advisory>
        <Package name="mod_python">mod_python-0:3.0.3-5.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:100">RHSA-2005:100</Advisory>
        <Package name="mod_python">mod_python-0:3.1.3-5.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0088
https://nvd.nist.gov/vuln/detail/CVE-2005-0088
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0089">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-03T00:00:00</PublicDate>
    <Bugzilla id="1617451" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617451" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:109">RHSA-2005:109</Advisory>
        <Package name="python">python-0:2.2.3-6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:108">RHSA-2005:108</Advisory>
        <Package name="python">python-0:2.3.4-14.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0089
https://nvd.nist.gov/vuln/detail/CVE-2005-0089
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0090">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617452" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617452" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an &quot;access check,&quot; which allows local users to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0090
https://nvd.nist.gov/vuln/detail/CVE-2005-0090
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0091">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617453" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617453" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0091
https://nvd.nist.gov/vuln/detail/CVE-2005-0091
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0092">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617454" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617454" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0092
https://nvd.nist.gov/vuln/detail/CVE-2005-0092
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0094">
    <PublicDate>2005-01-12T00:00:00</PublicDate>
    <Bugzilla id="1617455" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617455" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0094
https://nvd.nist.gov/vuln/detail/CVE-2005-0094
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0095">
    <PublicDate>2005-01-12T00:00:00</PublicDate>
    <Bugzilla id="1617456" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617456" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0095
https://nvd.nist.gov/vuln/detail/CVE-2005-0095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0096">
    <PublicDate>2005-01-08T00:00:00</PublicDate>
    <Bugzilla id="1617457" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617457" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0096
https://nvd.nist.gov/vuln/detail/CVE-2005-0096
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0097">
    <PublicDate>2005-01-08T00:00:00</PublicDate>
    <Bugzilla id="1617458" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617458" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0097
https://nvd.nist.gov/vuln/detail/CVE-2005-0097
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0100">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-06T00:00:00</PublicDate>
    <Bugzilla id="1617459" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617459" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:112">RHSA-2005:112</Advisory>
        <Package name="emacs">emacs-0:21.3-4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:134">RHSA-2005:134</Advisory>
        <Package name="xemacs">xemacs-0:21.4.13-8.ent.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:110">RHSA-2005:110</Advisory>
        <Package name="emacs">emacs-0:21.3-19.EL.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:133">RHSA-2005:133</Advisory>
        <Package name="xemacs">xemacs-0:21.4.15-10.EL.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0100
https://nvd.nist.gov/vuln/detail/CVE-2005-0100
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0102">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-18T00:00:00</PublicDate>
    <Bugzilla id="1617460" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617460" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:238">RHSA-2005:238</Advisory>
        <Package name="evolution">evolution-0:1.4.5-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:397">RHSA-2005:397</Advisory>
        <Package name="evolution">evolution-0:2.0.2-16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0102
https://nvd.nist.gov/vuln/detail/CVE-2005-0102
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0103">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-22T00:00:00</PublicDate>
    <Bugzilla id="1617461" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617461" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP remote file inclusion vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to execute arbitrary PHP code by modifying a URL parameter to reference a URL on a remote web server that contains the code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:135">RHSA-2005:135</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:099">RHSA-2005:099</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0103
https://nvd.nist.gov/vuln/detail/CVE-2005-0103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0104">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-22T00:00:00</PublicDate>
    <Bugzilla id="1617462" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617462" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in webmail.php in SquirrelMail before 1.4.4 allows remote attackers to inject arbitrary web script or HTML via certain integer variables.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:135">RHSA-2005:135</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:099">RHSA-2005:099</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-9.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0104
https://nvd.nist.gov/vuln/detail/CVE-2005-0104
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0109">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-13T00:00:00</PublicDate>
    <Bugzilla id="1617463" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617463" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:476">RHSA-2005:476</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0109
https://nvd.nist.gov/vuln/detail/CVE-2005-0109
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0124">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-10T00:00:00</PublicDate>
    <Bugzilla id="1617464" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617464" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0124
https://nvd.nist.gov/vuln/detail/CVE-2005-0124
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0135">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617465" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617465" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0135
https://nvd.nist.gov/vuln/detail/CVE-2005-0135
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0136">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617466" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617466" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain &quot;ptrace corner cases&quot; that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:420">RHSA-2005:420</Advisory>
        <Package name="kernel">kernel-0:2.6.9-11.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0136
https://nvd.nist.gov/vuln/detail/CVE-2005-0136
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0137">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617467" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617467" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a &quot;missing Itanium syscall table entry.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0137
https://nvd.nist.gov/vuln/detail/CVE-2005-0137
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0141">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-19T00:00:00</PublicDate>
    <Bugzilla id="1617469" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617469" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5 allow remote attackers to load local files via links &quot;with a custom getter and toString method&quot; that are middle-clicked by the user to be opened in a new tab.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0141
https://nvd.nist.gov/vuln/detail/CVE-2005-0141
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0142">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617470" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617470" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 0.9, Thunderbird 0.6 and other versions before 0.9, and Mozilla 1.7 before 1.7.5 save temporary files with world-readable permissions, which allows local users to read certain web content or attachments that belong to other users, e.g. content that is managed by helper applications such as PDF.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0142
https://nvd.nist.gov/vuln/detail/CVE-2005-0142
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0143">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617471" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617471" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5 display the SSL lock icon when an insecure page loads a binary file from a trusted site, which could facilitate phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0143
https://nvd.nist.gov/vuln/detail/CVE-2005-0143
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0144">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617472" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617472" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5 display the secure site lock icon when a view-source: URL references a secure SSL site while an insecure page is being loaded, which could facilitate phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0144
https://nvd.nist.gov/vuln/detail/CVE-2005-0144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0146">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617473" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617473" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5 allow remote attackers to obtain sensitive data from the clipboard via Javascript that generates a middle-click event on systems for which a middle-click performs a paste operation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:094">RHSA-2005:094</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0-1.1.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0146
https://nvd.nist.gov/vuln/detail/CVE-2005-0146
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0147">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617474" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617474" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0 and Mozilla before 1.7.5, when configured to use a proxy, respond to 407 proxy auth requests from arbitrary servers, which allows remote attackers to steal NTLM or SPNEGO credentials.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0147
https://nvd.nist.gov/vuln/detail/CVE-2005-0147
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0149">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617475" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617475" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Thunderbird 0.6 through 0.9 and Mozilla 1.7 through 1.7.3 does not obey the network.cookie.disableCookieForMailNews preference, which could allow remote attackers to bypass the user's intended privacy and security policy by using cookies in e-mail messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:094">RHSA-2005:094</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0-1.1.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0149
https://nvd.nist.gov/vuln/detail/CVE-2005-0149
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0155">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-01T00:00:00</PublicDate>
    <Bugzilla id="1617476" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617476" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:105">RHSA-2005:105</Advisory>
        <Package name="perl">perl-2:5.8.0-89.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:103">RHSA-2005:103</Advisory>
        <Package name="perl">perl-3:5.8.5-12.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0155
https://nvd.nist.gov/vuln/detail/CVE-2005-0155
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0156">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-01T00:00:00</PublicDate>
    <Bugzilla id="1617477" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617477" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:105">RHSA-2005:105</Advisory>
        <Package name="perl">perl-2:5.8.0-89.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:103">RHSA-2005:103</Advisory>
        <Package name="perl">perl-3:5.8.5-12.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0156
https://nvd.nist.gov/vuln/detail/CVE-2005-0156
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0173">
    <PublicDate>2005-01-10T00:00:00</PublicDate>
    <Bugzilla id="1617478" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617478" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0173
https://nvd.nist.gov/vuln/detail/CVE-2005-0173
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0174">
    <PublicDate>2005-01-31T00:00:00</PublicDate>
    <Bugzilla id="1617479" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617479" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0174
https://nvd.nist.gov/vuln/detail/CVE-2005-0174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0175">
    <PublicDate>2005-01-31T00:00:00</PublicDate>
    <Bugzilla id="1617480" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617480" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0175
https://nvd.nist.gov/vuln/detail/CVE-2005-0175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0176">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617481" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617481" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:472">RHSA-2005:472</Advisory>
        <Package name="kernel">kernel-0:2.4.21-32.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0176
https://nvd.nist.gov/vuln/detail/CVE-2005-0176
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0177">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617482" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617482" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0177
https://nvd.nist.gov/vuln/detail/CVE-2005-0177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0178">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617483" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617483" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0178
https://nvd.nist.gov/vuln/detail/CVE-2005-0178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0179">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-07T00:00:00</PublicDate>
    <Bugzilla id="1617484" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617484" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0179
https://nvd.nist.gov/vuln/detail/CVE-2005-0179
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0180">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-07T00:00:00</PublicDate>
    <Bugzilla id="1617485" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617485" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0180
https://nvd.nist.gov/vuln/detail/CVE-2005-0180
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0189">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-09-28T00:00:00</PublicDate>
    <Bugzilla id="1617486" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617486" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the HandleAction function in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to execute arbitrary code via a long ShowPreferences argument.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0189
https://nvd.nist.gov/vuln/detail/CVE-2005-0189
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0191">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2004-09-28T00:00:00</PublicDate>
    <Bugzilla id="1617487" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617487" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in the processing of tags in Real Metadata Package (RMP) files in RealPlayer 10.5 (6.0.12.1040) and earlier could allow remote attackers to execute arbitrary code via a long tag.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0191
https://nvd.nist.gov/vuln/detail/CVE-2005-0191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0198">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-27T00:00:00</PublicDate>
    <Bugzilla id="1617488" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617488" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:128">RHSA-2005:128</Advisory>
        <Package name="imap">imap-1:2002d-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0198
https://nvd.nist.gov/vuln/detail/CVE-2005-0198
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0201">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-31T00:00:00</PublicDate>
    <Bugzilla id="1617489" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617489" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
D-BUS (dbus) before 0.22 does not properly restrict access to a socket, if the socket address is known, which allows local users to listen or send arbitrary messages on another user's per-user session bus via that socket.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:102">RHSA-2005:102</Advisory>
        <Package name="dbus">dbus-0:0.22-12.EL.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0201
https://nvd.nist.gov/vuln/detail/CVE-2005-0201
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0202">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-09T00:00:00</PublicDate>
    <Bugzilla id="1617490" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617490" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via &quot;.../....///&quot; sequences, which are not properly cleansed by regular expressions that are intended to remove &quot;../&quot; and &quot;./&quot; sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:136">RHSA-2005:136</Advisory>
        <Package name="mailman">mailman-3:2.1.5-24.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:137">RHSA-2005:137</Advisory>
        <Package name="mailman">mailman-3:2.1.5-31.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0202
https://nvd.nist.gov/vuln/detail/CVE-2005-0202
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0204">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-26T00:00:00</PublicDate>
    <Bugzilla id="1617491" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617491" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:092">RHSA-2005:092</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0204
https://nvd.nist.gov/vuln/detail/CVE-2005-0204
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0205">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-28T00:00:00</PublicDate>
    <Bugzilla id="1617492" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617492" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KPPP 2.1.2 in KDE 3.1.5 and earlier, when setuid root without certain wrappers, does not properly close a privileged file descriptor for a domain socket, which allows local users to read and write to /etc/hosts and /etc/resolv.conf and gain control over DNS name resolution by opening a number of file descriptors before executing kppp.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:175">RHSA-2005:175</Advisory>
        <Package name="kdenetwork">kdenetwork-7:3.1.3-1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0205
https://nvd.nist.gov/vuln/detail/CVE-2005-0205
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0206">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-10-20T00:00:00</PublicDate>
    <Bugzilla id="1617493" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617493" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:132">RHSA-2005:132</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.27</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:213">RHSA-2005:213</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:034">RHSA-2005:034</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:053">RHSA-2005:053</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:057">RHSA-2005:057</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0206
https://nvd.nist.gov/vuln/detail/CVE-2005-0206
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0207">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617494" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617494" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0207
https://nvd.nist.gov/vuln/detail/CVE-2005-0207
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0208">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617495" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617495" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTML parsing functions in Gaim before 1.1.4 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes &quot;an invalid memory access,&quot; a different vulnerability than CVE-2005-0473.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0208
https://nvd.nist.gov/vuln/detail/CVE-2005-0208
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0209">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-24T00:00:00</PublicDate>
    <Bugzilla id="1617496" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617496" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via crafted IP packet fragments.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:420">RHSA-2005:420</Advisory>
        <Package name="kernel">kernel-0:2.6.9-11.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0209
https://nvd.nist.gov/vuln/detail/CVE-2005-0209
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0210">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-30T00:00:00</PublicDate>
    <Bugzilla id="1617497" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617497" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0210
https://nvd.nist.gov/vuln/detail/CVE-2005-0210
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0211">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-28T00:00:00</PublicDate>
    <Bugzilla id="1617498" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617498" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0211
https://nvd.nist.gov/vuln/detail/CVE-2005-0211
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0227">
    <PublicDate>2005-01-21T00:00:00</PublicDate>
    <Bugzilla id="1617499" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617499" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:141">RHSA-2005:141</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.9-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:138">RHSA-2005:138</Advisory>
        <Package name="postgresql">postgresql-0:7.4.7-2.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0227
https://nvd.nist.gov/vuln/detail/CVE-2005-0227
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0231">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-07T00:00:00</PublicDate>
    <Bugzilla id="1617500" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617500" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0 does not invoke the Javascript Security Manager when a user drags a javascript: or data: URL to a tab, which allows remote attackers to bypass the security model, aka &quot;firetabbing.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0231
https://nvd.nist.gov/vuln/detail/CVE-2005-0231
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0232">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-07T00:00:00</PublicDate>
    <Bugzilla id="1617501" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617501" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0 allows remote attackers to modify Boolean configuration parameters for the about:config site by using a plugin such as Flash, and the -moz-opacity filter, to display the about:config site then cause the user to double-click at a certain screen position, aka &quot;Fireflashing.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0232
https://nvd.nist.gov/vuln/detail/CVE-2005-0232
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0233">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-07T00:00:00</PublicDate>
    <Bugzilla id="1617502" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617502" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0233
https://nvd.nist.gov/vuln/detail/CVE-2005-0233
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0237">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-07T00:00:00</PublicDate>
    <Bugzilla id="1617503" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617503" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The International Domain Name (IDN) support in Konqueror 3.2.1 on KDE 3.2.1 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:325">RHSA-2005:325</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0237
https://nvd.nist.gov/vuln/detail/CVE-2005-0237
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0241">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-31T00:00:00</PublicDate>
    <Bugzilla id="1617504" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617504" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling &quot;oversized&quot; HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:061">RHSA-2005:061</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:060">RHSA-2005:060</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0241
https://nvd.nist.gov/vuln/detail/CVE-2005-0241
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0244">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-27T00:00:00</PublicDate>
    <Bugzilla id="1617505" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617505" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:141">RHSA-2005:141</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.9-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:138">RHSA-2005:138</Advisory>
        <Package name="postgresql">postgresql-0:7.4.7-2.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0244
https://nvd.nist.gov/vuln/detail/CVE-2005-0244
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0245">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-20T00:00:00</PublicDate>
    <Bugzilla id="1617506" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617506" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:141">RHSA-2005:141</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.9-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:138">RHSA-2005:138</Advisory>
        <Package name="postgresql">postgresql-0:7.4.7-2.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0245
https://nvd.nist.gov/vuln/detail/CVE-2005-0245
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0246">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-27T00:00:00</PublicDate>
    <Bugzilla id="1617507" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617507" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:141">RHSA-2005:141</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.9-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:138">RHSA-2005:138</Advisory>
        <Package name="postgresql">postgresql-0:7.4.7-2.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0246
https://nvd.nist.gov/vuln/detail/CVE-2005-0246
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0247">
    <PublicDate>2005-02-01T00:00:00</PublicDate>
    <Bugzilla id="1617508" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617508" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:141">RHSA-2005:141</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.9-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:138">RHSA-2005:138</Advisory>
        <Package name="postgresql">postgresql-0:7.4.7-2.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-02-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:150">RHSA-2005:150</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0247
https://nvd.nist.gov/vuln/detail/CVE-2005-0247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0255">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-28T00:00:00</PublicDate>
    <Bugzilla id="1617509" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617509" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
String handling functions in Mozilla 1.7.3, Firefox 1.0, and Thunderbird before 1.0.2, such as the nsTSubstring_CharT::Replace function, do not properly check the return values of other functions that resize the string, which allows remote attackers to cause a denial of service and possibly execute arbitrary code by forcing an out-of-memory state that causes a reallocation to fail and return a pointer to a fixed address, which leads to heap corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:337">RHSA-2005:337</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.2-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0255
https://nvd.nist.gov/vuln/detail/CVE-2005-0255
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0256">
    <Details source="Mitre" xml:lang="en:us">
The wu_fnmatch function in wu_fnmatch.c in wu-ftpd 2.6.1 and 2.6.2 allows remote attackers to cause a denial of service (CPU exhaustion by recursion) via a glob pattern with a large number of * (wildcard) characters, as demonstrated using the dir command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Red Hat Enterprise Linux 2.1 shipped with wu-ftpd, however we were unable to reproduce this issue.  Additionally, a code analysis showed that attempts to exploit this issue would be caught in the versions we shipped.
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=149720
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0256
https://nvd.nist.gov/vuln/detail/CVE-2005-0256
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0337">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-31T00:00:00</PublicDate>
    <Bugzilla id="1617510" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617510" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:152">RHSA-2005:152</Advisory>
        <Package name="postfix">postfix-2:2.1.5-4.2.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0337
https://nvd.nist.gov/vuln/detail/CVE-2005-0337
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0356">
    <Details source="Mitre" xml:lang="en:us">
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0356
https://nvd.nist.gov/vuln/detail/CVE-2005-0356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0365">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-21T00:00:00</PublicDate>
    <Bugzilla id="1617511" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617511" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dcopidlng script in KDE 3.2.x and 3.3.x creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:325">RHSA-2005:325</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0365
https://nvd.nist.gov/vuln/detail/CVE-2005-0365
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0372">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-14T00:00:00</PublicDate>
    <Bugzilla id="1617512" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617512" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary files via .. (dot dot) sequences in filenames returned from a LIST command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:410">RHSA-2005:410</Advisory>
        <Package name="gftp">gftp-1:2.0.14-4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:410">RHSA-2005:410</Advisory>
        <Package name="gftp">gftp-1:2.0.17-5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0372
https://nvd.nist.gov/vuln/detail/CVE-2005-0372
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0373">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Cyrus SASL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0373
https://nvd.nist.gov/vuln/detail/CVE-2005-0373
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0384">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-15T00:00:00</PublicDate>
    <Bugzilla id="1617513" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617513" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0384
https://nvd.nist.gov/vuln/detail/CVE-2005-0384
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0396">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-16T00:00:00</PublicDate>
    <Bugzilla id="1617514" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617514" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Desktop Communication Protocol (DCOP) daemon, aka dcopserver, in KDE before 3.4 allows local users to cause a denial of service (dcopserver consumption) by &quot;stalling the DCOP authentication process.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:307">RHSA-2005:307</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:325">RHSA-2005:325</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0396
https://nvd.nist.gov/vuln/detail/CVE-2005-0396
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0397">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-02T00:00:00</PublicDate>
    <Bugzilla id="1617515" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617515" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick before 6.0.2.5 may allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a filename argument to convert, which may be called by other web applications.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:320">RHSA-2005:320</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0397
https://nvd.nist.gov/vuln/detail/CVE-2005-0397
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0398">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-09T00:00:00</PublicDate>
    <Bugzilla id="1617516" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617516" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:232">RHSA-2005:232</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:232">RHSA-2005:232</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.3.3-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0398
https://nvd.nist.gov/vuln/detail/CVE-2005-0398
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0399">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-03-23T00:00:00</PublicDate>
    <Bugzilla id="1617517" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617517" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in GIF2.cpp in Firefox before 1.0.2, Mozilla before to 1.7.6, and Thunderbird before 1.0.2, and possibly other applications that use the same library, allows remote attackers to execute arbitrary code via a GIF image with a crafted Netscape extension 2 block and buffer size.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:336">RHSA-2005:336</Advisory>
        <Package name="firefox">firefox-0:1.0.2-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:337">RHSA-2005:337</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.2-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0399
https://nvd.nist.gov/vuln/detail/CVE-2005-0399
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0400">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-21T00:00:00</PublicDate>
    <Bugzilla id="1617518" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617518" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0400
https://nvd.nist.gov/vuln/detail/CVE-2005-0400
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0401">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-23T00:00:00</PublicDate>
    <Bugzilla id="1617519" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617519" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
FireFox 1.0.1 and Mozilla before 1.7.6 do not sufficiently address all attack vectors for loading chrome files and hijacking drag and drop events, which allows remote attackers to execute arbitrary XUL code by tricking a user into dragging a scrollbar, a variant of CVE-2005-0527, aka &quot;Firescrolling 2.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:335">RHSA-2005:335</Advisory>
        <Package name="evolution">evolution-0:2.0.2-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:336">RHSA-2005:336</Advisory>
        <Package name="firefox">firefox-0:1.0.2-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0401
https://nvd.nist.gov/vuln/detail/CVE-2005-0401
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0402">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-23T00:00:00</PublicDate>
    <Bugzilla id="1617521" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617521" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.2 allows remote attackers to execute arbitrary code by tricking a user into saving a page as a Firefox sidebar panel, then using the sidebar panel to inject Javascript into a privileged page.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:336">RHSA-2005:336</Advisory>
        <Package name="firefox">firefox-0:1.0.2-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0402
https://nvd.nist.gov/vuln/detail/CVE-2005-0402
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0403">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-08T00:00:00</PublicDate>
    <Bugzilla id="1617522" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617522" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0403
https://nvd.nist.gov/vuln/detail/CVE-2005-0403
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0446">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-13T00:00:00</PublicDate>
    <Bugzilla id="1617523" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617523" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:173">RHSA-2005:173</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:201">RHSA-2005:201</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0446
https://nvd.nist.gov/vuln/detail/CVE-2005-0446
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0448">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-09T00:00:00</PublicDate>
    <Bugzilla id="1617524" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617524" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:881">RHSA-2005:881</Advisory>
        <Package name="perl">perl-2:5.8.0-90.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:674">RHSA-2005:674</Advisory>
        <Package name="perl">perl-3:5.8.5-16.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0448
https://nvd.nist.gov/vuln/detail/CVE-2005-0448
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0449">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-24T00:00:00</PublicDate>
    <Bugzilla id="1617525" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617525" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0449
https://nvd.nist.gov/vuln/detail/CVE-2005-0449
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0455">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617526" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617526" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:265">RHSA-2005:265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:271">RHSA-2005:271</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.3-1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0455
https://nvd.nist.gov/vuln/detail/CVE-2005-0455
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0468">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-28T00:00:00</PublicDate>
    <Bugzilla id="1617527" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617527" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:327">RHSA-2005:327</Advisory>
        <Package name="telnet">telnet-1:0.17-26.EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:330">RHSA-2005:330</Advisory>
        <Package name="krb5">krb5-0:1.2.7-42</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:327">RHSA-2005:327</Advisory>
        <Package name="telnet">telnet-1:0.17-31.EL4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:330">RHSA-2005:330</Advisory>
        <Package name="krb5">krb5-0:1.3.4-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0468
https://nvd.nist.gov/vuln/detail/CVE-2005-0468
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0469">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-28T00:00:00</PublicDate>
    <Bugzilla id="1617528" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617528" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:327">RHSA-2005:327</Advisory>
        <Package name="telnet">telnet-1:0.17-26.EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:330">RHSA-2005:330</Advisory>
        <Package name="krb5">krb5-0:1.2.7-42</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:327">RHSA-2005:327</Advisory>
        <Package name="telnet">telnet-1:0.17-31.EL4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:330">RHSA-2005:330</Advisory>
        <Package name="krb5">krb5-0:1.3.4-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0469
https://nvd.nist.gov/vuln/detail/CVE-2005-0469
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0472">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-17T00:00:00</PublicDate>
    <Bugzilla id="1617529" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617529" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0472
https://nvd.nist.gov/vuln/detail/CVE-2005-0472
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0473">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-17T00:00:00</PublicDate>
    <Bugzilla id="1617530" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617530" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes &quot;an invalid memory access,&quot; a different vulnerability than CVE-2005-0208.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0473
https://nvd.nist.gov/vuln/detail/CVE-2005-0473
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0488">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-14T00:00:00</PublicDate>
    <Bugzilla id="1617531" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617531" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Gaël Delalleau and the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:504">RHSA-2005:504</Advisory>
        <Package name="telnet">telnet-1:0.17-26.EL3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:562">RHSA-2005:562</Advisory>
        <Package name="krb5">krb5-0:1.2.7-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:504">RHSA-2005:504</Advisory>
        <Package name="telnet">telnet-1:0.17-31.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0488
https://nvd.nist.gov/vuln/detail/CVE-2005-0488
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0490">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-21T00:00:00</PublicDate>
    <Bugzilla id="1617532" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617532" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:340">RHSA-2005:340</Advisory>
        <Package name="curl">curl-0:7.10.6-6.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:340">RHSA-2005:340</Advisory>
        <Package name="curl">curl-0:7.12.1-5.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0490
https://nvd.nist.gov/vuln/detail/CVE-2005-0490
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0504">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-30T00:00:00</PublicDate>
    <Bugzilla id="423111" url="https://bugzilla.redhat.com/show_bug.cgi?id=423111" xml:lang="en:us">
Buffer overflow in moxa driver
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-05-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0237">RHSA-2008:0237</Advisory>
        <Package name="kernel">kernel-0:2.6.9-67.0.15.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0504
https://nvd.nist.gov/vuln/detail/CVE-2005-0504
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0524">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617533" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617533" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:405">RHSA-2005:405</Advisory>
        <Package name="php">php-0:4.3.2-23.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:406">RHSA-2005:406</Advisory>
        <Package name="php">php-0:4.3.9-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0524
https://nvd.nist.gov/vuln/detail/CVE-2005-0524
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0525">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617534" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617534" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:405">RHSA-2005:405</Advisory>
        <Package name="php">php-0:4.3.2-23.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:406">RHSA-2005:406</Advisory>
        <Package name="php">php-0:4.3.9-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0525
https://nvd.nist.gov/vuln/detail/CVE-2005-0525
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0527">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-25T00:00:00</PublicDate>
    <Bugzilla id="1617535" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617535" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0 allows remote attackers to execute arbitrary code via plugins that load &quot;privileged content&quot; into frames, as demonstrated using certain XUL events when a user drags a scrollbar two times, aka &quot;Firescrolling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0527
https://nvd.nist.gov/vuln/detail/CVE-2005-0527
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0529">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617536" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617536" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0529
https://nvd.nist.gov/vuln/detail/CVE-2005-0529
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0530">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617537" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617537" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0530
https://nvd.nist.gov/vuln/detail/CVE-2005-0530
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0531">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617538" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617538" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0531
https://nvd.nist.gov/vuln/detail/CVE-2005-0531
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0546">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-14T00:00:00</PublicDate>
    <Bugzilla id="1617539" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617539" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in &quot;cached header handling,&quot; (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:408">RHSA-2005:408</Advisory>
        <Package name="cyrus-imapd">cyrus-imapd-0:2.2.12-3.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0546
https://nvd.nist.gov/vuln/detail/CVE-2005-0546
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0578">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617540" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617540" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla Suite before 1.7.6 use a predictable filename for the plugin temporary directory, which allows local users to delete arbitrary files of other users via a symlink attack on the plugtmp directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0578
https://nvd.nist.gov/vuln/detail/CVE-2005-0578
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0584">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617541" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617541" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla before 1.7.6, when displaying the HTTP Authentication dialog, do not change the focus to the tab that generated the prompt, which could facilitate spoofing and phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0584
https://nvd.nist.gov/vuln/detail/CVE-2005-0584
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0585">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617542" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617542" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla before 1.7.6 truncates long sub-domains or paths for display, which may allow remote malicious web sites to spoof legitimate sites and facilitate phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0585
https://nvd.nist.gov/vuln/detail/CVE-2005-0585
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0586">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617544" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617544" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote malicious web sites to spoof the extensions of files to download via the Content-Disposition header, which could be used to trick users into downloading dangerous content.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0586
https://nvd.nist.gov/vuln/detail/CVE-2005-0586
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0588">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617545" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617545" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla before 1.7.6 does not restrict xsl:include and xsl:import tags in XSLT stylesheets to the current domain, which allows remote attackers to determine the existence of files on the local system.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0588
https://nvd.nist.gov/vuln/detail/CVE-2005-0588
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0589">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617546" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617546" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Form Fill feature in Firefox before 1.0.1 allows remote attackers to steal potentially sensitive information via an input control that monitors the values that are generated by the autocomplete capability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0589
https://nvd.nist.gov/vuln/detail/CVE-2005-0589
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0590">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617547" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617547" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The installation confirmation dialog in Firefox before 1.0.1, Thunderbird before 1.0.1, and Mozilla before 1.7.6 allows remote attackers to use InstallTrigger to spoof the hostname of the host performing the installation via a long &quot;user:pass&quot; sequence in the URL, which appears before the real hostname.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0590
https://nvd.nist.gov/vuln/detail/CVE-2005-0590
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0591">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617548" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617548" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 allows remote attackers to spoof the (1) security and (2) download modal dialog boxes, which could be used to trick users into executing script or downloading and executing a file, aka &quot;Firespoofing.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0591
https://nvd.nist.gov/vuln/detail/CVE-2005-0591
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0592">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617550" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617550" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the UTF8ToNewUnicode function for Firefox before 1.0.1 and Mozilla before 1.7.6 might allow remote attackers to cause a denial of service (crash) or execute arbitrary code via invalid sequences in a UTF8 encoded string that result in a zero length value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0592
https://nvd.nist.gov/vuln/detail/CVE-2005-0592
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0593">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617551" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617551" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.1 and Mozilla before 1.7.6 allows remote attackers to spoof the SSL &quot;secure site&quot; lock icon via (1) a web site that does not finish loading, which shows the lock of the previous site, (2) a non-HTTP server that uses SSL, which causes the lock to be displayed when the SSL handshake is completed, or (3) a URL that generates an HTTP 204 error, which updates the icon and location information but does not change the display of the original site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:176">RHSA-2005:176</Advisory>
        <Package name="firefox">firefox-0:1.0.1-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0593
https://nvd.nist.gov/vuln/detail/CVE-2005-0593
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0602">
    <Details source="Mitre" xml:lang="en:us">
Unzip 5.51 and earlier does not properly warn the user when extracting setuid or setgid files, which may allow local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this a security vulnerability; this is the expected behaviour.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0602
https://nvd.nist.gov/vuln/detail/CVE-2005-0602
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0605">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-01T00:00:00</PublicDate>
    <Bugzilla id="430520" url="https://bugzilla.redhat.com/show_bug.cgi?id=430520" xml:lang="en:us">
libxpm buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:331">RHSA-2005:331</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-81.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:412">RHSA-2005:412</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-5.RHEL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:412">RHSA-2005:412</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:198">RHSA-2005:198</Advisory>
        <Package name="fonts-xorg">fonts-xorg-0:6.8.1.1-1.EL.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:198">RHSA-2005:198</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:412">RHSA-2005:412</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-9.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:412">RHSA-2005:412</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:044">RHSA-2005:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:473">RHSA-2005:473</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:044">RHSA-2005:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:473">RHSA-2005:473</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:044">RHSA-2005:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:473">RHSA-2005:473</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:044">RHSA-2005:044</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:473">RHSA-2005:473</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0605
https://nvd.nist.gov/vuln/detail/CVE-2005-0605
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0611">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-24T00:00:00</PublicDate>
    <Bugzilla id="1617552" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617552" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:299">RHSA-2005:299</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:265">RHSA-2005:265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:271">RHSA-2005:271</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.3-1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0611
https://nvd.nist.gov/vuln/detail/CVE-2005-0611
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0626">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-02T00:00:00</PublicDate>
    <Bugzilla id="1617553" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617553" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0626
https://nvd.nist.gov/vuln/detail/CVE-2005-0626
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0638">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-18T00:00:00</PublicDate>
    <Bugzilla id="1617554" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617554" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:332">RHSA-2005:332</Advisory>
        <Package name="xloadimage">xloadimage-0:4.1-34.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:332">RHSA-2005:332</Advisory>
        <Package name="xloadimage">xloadimage-0:4.1-34.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0638
https://nvd.nist.gov/vuln/detail/CVE-2005-0638
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0664">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-03T00:00:00</PublicDate>
    <Bugzilla id="1617555" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617555" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:300">RHSA-2005:300</Advisory>
        <Package name="libexif">libexif-0:0.5.12-5.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0664
https://nvd.nist.gov/vuln/detail/CVE-2005-0664
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0667">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-07T00:00:00</PublicDate>
    <Bugzilla id="1617556" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617556" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:303">RHSA-2005:303</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:303">RHSA-2005:303</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:303">RHSA-2005:303</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:303">RHSA-2005:303</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0667
https://nvd.nist.gov/vuln/detail/CVE-2005-0667
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0699">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617557" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617557" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0699
https://nvd.nist.gov/vuln/detail/CVE-2005-0699
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0704">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617558" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617558" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Etheric dissector in Ethereal 0.10.7 through 0.10.9 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0704
https://nvd.nist.gov/vuln/detail/CVE-2005-0704
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0705">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617559" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617559" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GPRS-LLC dissector in Ethereal 0.10.7 through 0.10.9, with the &quot;ignore cipher bit&quot; option enabled. allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0705
https://nvd.nist.gov/vuln/detail/CVE-2005-0705
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0706">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-09T00:00:00</PublicDate>
    <Bugzilla id="470552" url="https://bugzilla.redhat.com/show_bug.cgi?id=470552" xml:lang="en:us">
grip,libcdaudio: buffer overflow caused by large amount of CDDB replies
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0005">RHSA-2009:0005</Advisory>
        <Package name="gnome-vfs">gnome-vfs-0:1.0.1-18.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0005">RHSA-2009:0005</Advisory>
        <Package name="gnome-vfs2">gnome-vfs2-0:2.2.5-2E.3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0005">RHSA-2009:0005</Advisory>
        <Package name="gnome-vfs2">gnome-vfs2-0:2.8.2-8.7.el4_7.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:304">RHSA-2005:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:304">RHSA-2005:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:304">RHSA-2005:304</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:304">RHSA-2005:304</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0706
https://nvd.nist.gov/vuln/detail/CVE-2005-0706
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0709">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617560" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617560" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:348">RHSA-2005:348</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:3.23.58-15.RHEL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:4.1.10a-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0709
https://nvd.nist.gov/vuln/detail/CVE-2005-0709
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0710">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617561" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617561" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:348">RHSA-2005:348</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:3.23.58-15.RHEL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:4.1.10a-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0710
https://nvd.nist.gov/vuln/detail/CVE-2005-0710
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0711">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617562" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617562" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:348">RHSA-2005:348</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:3.23.58-15.RHEL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-03-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:334">RHSA-2005:334</Advisory>
        <Package name="mysql">mysql-0:4.1.10a-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0711
https://nvd.nist.gov/vuln/detail/CVE-2005-0711
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0718">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-04T00:00:00</PublicDate>
    <Bugzilla id="1617563" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617563" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0718
https://nvd.nist.gov/vuln/detail/CVE-2005-0718
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0736">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-09T00:00:00</PublicDate>
    <Bugzilla id="1617564" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617564" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0736
https://nvd.nist.gov/vuln/detail/CVE-2005-0736
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0739">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617565" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617565" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0739
https://nvd.nist.gov/vuln/detail/CVE-2005-0739
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0749">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-18T00:00:00</PublicDate>
    <Bugzilla id="1617566" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617566" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0749
https://nvd.nist.gov/vuln/detail/CVE-2005-0749
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0750">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-24T00:00:00</PublicDate>
    <Bugzilla id="1617567" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617567" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:293">RHSA-2005:293</Advisory>
        <Package name="kernel">kernel-0:2.4.21-27.0.4.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:283">RHSA-2005:283</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:284">RHSA-2005:284</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0750
https://nvd.nist.gov/vuln/detail/CVE-2005-0750
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0752">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617568" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617568" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0752
https://nvd.nist.gov/vuln/detail/CVE-2005-0752
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0753">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-18T00:00:00</PublicDate>
    <Bugzilla id="1617569" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617569" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:387">RHSA-2005:387</Advisory>
        <Package name="cvs">cvs-0:1.11.2-27</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:387">RHSA-2005:387</Advisory>
        <Package name="cvs">cvs-0:1.11.17-7.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0753
https://nvd.nist.gov/vuln/detail/CVE-2005-0753
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0755">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-04-19T00:00:00</PublicDate>
    <Bugzilla id="1617570" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617570" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:394">RHSA-2005:394</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:363">RHSA-2005:363</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:392">RHSA-2005:392</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.4-1.1.EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0755
https://nvd.nist.gov/vuln/detail/CVE-2005-0755
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0756">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617571" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617571" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0756
https://nvd.nist.gov/vuln/detail/CVE-2005-0756
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0757">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-18T00:00:00</PublicDate>
    <Bugzilla id="1617572" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617572" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:294">RHSA-2005:294</Advisory>
        <Package name="kernel">kernel-0:2.4.21-32.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0757
https://nvd.nist.gov/vuln/detail/CVE-2005-0757
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0758">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-22T00:00:00</PublicDate>
    <Bugzilla id="1617573" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617573" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-12.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-11.EL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-15.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-13.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0758
https://nvd.nist.gov/vuln/detail/CVE-2005-0758
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0759">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617574" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617574" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ImageMagick before 6.0 allows remote attackers to cause a denial of service (application crash) via a TIFF image with an invalid tag.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0759
https://nvd.nist.gov/vuln/detail/CVE-2005-0759
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0760">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617575" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617575" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The TIFF decoder in ImageMagick before 6.0 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0760
https://nvd.nist.gov/vuln/detail/CVE-2005-0760
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0761">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617576" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617576" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in ImageMagick before 6.1.8 allows remote attackers to cause a denial of service (application crash) via a crafted PSD file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0761
https://nvd.nist.gov/vuln/detail/CVE-2005-0761
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0762">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617577" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617577" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the SGI parser in ImageMagick before 6.0 allows remote attackers to execute arbitrary code via a crafted SGI image file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:070">RHSA-2005:070</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0762
https://nvd.nist.gov/vuln/detail/CVE-2005-0762
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0763">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-29T00:00:00</PublicDate>
    <Bugzilla id="1617578" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617578" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Midnight Commander (mc) 4.5.55 and earlier may allow attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:512">RHSA-2005:512</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0763
https://nvd.nist.gov/vuln/detail/CVE-2005-0763
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0765">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617579" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617579" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the JXTA dissector in Ethereal 0.10.9 allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0765
https://nvd.nist.gov/vuln/detail/CVE-2005-0765
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0766">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-11T00:00:00</PublicDate>
    <Bugzilla id="1617580" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617580" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the sFlow dissector in Ethereal 0.9.14 through 0.10.9 allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:306">RHSA-2005:306</Advisory>
        <Package name="ethereal">ethereal-0:0.10.10-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0766
https://nvd.nist.gov/vuln/detail/CVE-2005-0766
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0767">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-08T00:00:00</PublicDate>
    <Bugzilla id="1617581" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617581" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbitrary code as root.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0767
https://nvd.nist.gov/vuln/detail/CVE-2005-0767
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0784">
    <PublicDate>2004-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617582" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617582" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in Phorum before 5.0.15 allow remote attackers to inject arbitrary web script or HTML via (1) the subject line to follow.php or (2) the subject line in the user's personal control panel.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0784
https://nvd.nist.gov/vuln/detail/CVE-2005-0784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0806">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-20T00:00:00</PublicDate>
    <Bugzilla id="1617583" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617583" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Evolution 2.0.3 allows remote attackers to cause a denial of service (application crash or hang) via crafted messages, possibly involving charsets in attachment filenames.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:397">RHSA-2005:397</Advisory>
        <Package name="evolution">evolution-0:2.0.2-16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0806
https://nvd.nist.gov/vuln/detail/CVE-2005-0806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0815">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-17T00:00:00</PublicDate>
    <Bugzilla id="1617584" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617584" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;range checking flaws&quot; in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0815
https://nvd.nist.gov/vuln/detail/CVE-2005-0815
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0839">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-28T00:00:00</PublicDate>
    <Bugzilla id="1617585" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617585" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6 before 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0839
https://nvd.nist.gov/vuln/detail/CVE-2005-0839
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0867">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-27T00:00:00</PublicDate>
    <Bugzilla id="1617586" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617586" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Linux kernel 2.6 allows local users to overwrite kernel memory by writing to a sysfs file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0867
https://nvd.nist.gov/vuln/detail/CVE-2005-0867
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0877">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2021-10-02T00:00:00</PublicDate>
    <Bugzilla id="2011237" url="https://bugzilla.redhat.com/show_bug.cgi?id=2011237" xml:lang="en:us">
dnsmasq: DNS cache poisoning from local network may lead to DoS
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.7</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-346</CWE>
    <Details source="Mitre" xml:lang="en:us">
Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq.
    </Details>
    <Statement xml:lang="en:us">
RHOSP deployments are not affected because they pull dnsmasq directly from the rhel-7-server channel. A RHOSP dnsmasq update will therefore not be provided at this time. All RHEL versions are not affected because they have the updated/fixed dnsmasq.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:10">
        <ProductName>Red Hat OpenStack Platform 10 (Newton)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openstack:13">
        <ProductName>Red Hat OpenStack Platform 13 (Queens)</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>dnsmasq</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0877
https://nvd.nist.gov/vuln/detail/CVE-2005-0877
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0891">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-26T00:00:00</PublicDate>
    <Bugzilla id="1617587" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617587" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in gtk 2 (gtk2) before 2.2.4 allows remote attackers to cause a denial of service (crash) via a crafted BMP image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:343">RHSA-2005:343</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-12.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:344">RHSA-2005:344</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:343">RHSA-2005:343</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-16.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:344">RHSA-2005:344</Advisory>
        <Package name="gtk2">gtk2-0:2.4.13-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0891
https://nvd.nist.gov/vuln/detail/CVE-2005-0891
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0937">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-02-22T00:00:00</PublicDate>
    <Bugzilla id="1617588" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617588" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Some futex functions in futex.c for Linux kernel 2.6.x perform get_user calls while holding the mmap_sem semaphore, which could allow local users to cause a deadlock condition in do_page_fault by triggering get_user faults while another thread is executing mmap or other functions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:420">RHSA-2005:420</Advisory>
        <Package name="kernel">kernel-0:2.6.9-11.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0937
https://nvd.nist.gov/vuln/detail/CVE-2005-0937
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0941">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-12T00:00:00</PublicDate>
    <Bugzilla id="1617589" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617589" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The StgCompObjStream::Load function in OpenOffice.org OpenOffice 1.1.4 and earlier allocates memory based on 16 bit length values, but process memory using 32 bit values, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a DOC document with certain length values, which leads to a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:375">RHSA-2005:375</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-24.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:375">RHSA-2005:375</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-24.6.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0941
https://nvd.nist.gov/vuln/detail/CVE-2005-0941
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0953">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-30T00:00:00</PublicDate>
    <Bugzilla id="1617590" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617590" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-11.EL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-13.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0953
https://nvd.nist.gov/vuln/detail/CVE-2005-0953
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0965">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-01T00:00:00</PublicDate>
    <Bugzilla id="1617591" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617591" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The gaim_markup_strip_html function in Gaim 1.2.0, and possibly earlier versions, allows remote attackers to cause a denial of service (application crash) via a string that contains malformed HTML, which causes an out-of-bounds read.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0965
https://nvd.nist.gov/vuln/detail/CVE-2005-0965
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0966">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-01T00:00:00</PublicDate>
    <Bugzilla id="1617592" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617592" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IRC protocol plugin in Gaim 1.2.0, and possibly earlier versions, allows (1) remote attackers to inject arbitrary Gaim markup via irc_msg_kick, irc_msg_mode, irc_msg_part, irc_msg_quit, (2) remote attackers to inject arbitrary Pango markup and pop up empty dialog boxes via irc_msg_invite, or (3) malicious IRC servers to cause a denial of service (application crash) by injecting certain Pango markup into irc_msg_badmode, irc_msg_banned, irc_msg_unknown, irc_msg_nochan functions.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0966
https://nvd.nist.gov/vuln/detail/CVE-2005-0966
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0967">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-28T00:00:00</PublicDate>
    <Bugzilla id="1617593" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617593" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Gaim 1.2.0 allows remote attackers to cause a denial of service (application crash) via a malformed file transfer request to a Jabber user, which leads to an out-of-bounds read.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0967
https://nvd.nist.gov/vuln/detail/CVE-2005-0967
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0977">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-05T00:00:00</PublicDate>
    <Bugzilla id="1617594" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617594" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0977
https://nvd.nist.gov/vuln/detail/CVE-2005-0977
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0988">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-04T00:00:00</PublicDate>
    <Bugzilla id="1617595" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617595" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-12.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-15.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0988
https://nvd.nist.gov/vuln/detail/CVE-2005-0988
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0989">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617596" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617596" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The find_replen function in jsstr.c in the Javascript engine for Mozilla Suite 1.7.6, Firefox 1.0.1 and 1.0.2, and Netscape 7.2 allows remote attackers to read portions of heap memory in a Javascript string via the lambda replace method.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0989
https://nvd.nist.gov/vuln/detail/CVE-2005-0989
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-0990">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617597" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617597" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
unshar (unshar.c) in sharutils 4.2.1 allows local users to overwrite arbitrary files via a symlink attack on the unsh.X temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-16.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:377">RHSA-2005:377</Advisory>
        <Package name="sharutils">sharutils-0:4.2.1-22.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-0990
https://nvd.nist.gov/vuln/detail/CVE-2005-0990
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1038">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-06T00:00:00</PublicDate>
    <Bugzilla id="1617598" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617598" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink.  NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0117">RHSA-2006:0117</Advisory>
        <Package name="vixie-cron">vixie-cron-0:4.1-10.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:361">RHSA-2005:361</Advisory>
        <Package name="vixie-cron">vixie-cron-4:4.1-36.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1038
https://nvd.nist.gov/vuln/detail/CVE-2005-1038
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1041">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-19T00:00:00</PublicDate>
    <Bugzilla id="1617599" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617599" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The fib_seq_start function in fib_hash.c in Linux kernel allows local users to cause a denial of service (system crash) via /proc/net/route.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:366">RHSA-2005:366</Advisory>
        <Package name="kernel">kernel-0:2.6.9-5.0.5.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1041
https://nvd.nist.gov/vuln/detail/CVE-2005-1041
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1042">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617600" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617600" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:405">RHSA-2005:405</Advisory>
        <Package name="php">php-0:4.3.2-23.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:406">RHSA-2005:406</Advisory>
        <Package name="php">php-0:4.3.9-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1042
https://nvd.nist.gov/vuln/detail/CVE-2005-1042
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1043">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617601" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617601" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:405">RHSA-2005:405</Advisory>
        <Package name="php">php-0:4.3.2-23.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:406">RHSA-2005:406</Advisory>
        <Package name="php">php-0:4.3.9-3.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1043
https://nvd.nist.gov/vuln/detail/CVE-2005-1043
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1046">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-24T00:00:00</PublicDate>
    <Bugzilla id="1617602" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617602" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the kimgio library for KDE 3.4.0 allows remote attackers to execute arbitrary code via a crafted PCX image file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:393">RHSA-2005:393</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1046
https://nvd.nist.gov/vuln/detail/CVE-2005-1046
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1061">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-10-28T00:00:00</PublicDate>
    <Bugzilla id="1617603" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617603" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka &quot;logwatch log processing regular expression DoS.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:364">RHSA-2005:364</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:364">RHSA-2005:364</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:364">RHSA-2005:364</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-04-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:364">RHSA-2005:364</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1061
https://nvd.nist.gov/vuln/detail/CVE-2005-1061
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1080">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-04T00:00:00</PublicDate>
    <Bugzilla id="606442" url="https://bugzilla.redhat.com/show_bug.cgi?id=606442" xml:lang="en:us">
jar: directory traversal vulnerability
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-22</CWE>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the Java Archive Tool (Jar) utility in J2SE SDK 1.4.2 and 1.5, and OpenJDK, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in filenames in a .jar file.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:5">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0857">RHSA-2015:0857</Advisory>
        <Package name="java-1.7.0-oracle">java-1.7.0-oracle-1:1.7.0.79-1jpp.1.el5_11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:5">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0858">RHSA-2015:0858</Advisory>
        <Package name="java-1.6.0-sun">java-1.6.0-sun-1:1.6.0.95-1jpp.3.el5_11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:6">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0854">RHSA-2015:0854</Advisory>
        <Package name="java-1.8.0-oracle">java-1.8.0-oracle-1:1.8.0.45-1jpp.2.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:6">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0857">RHSA-2015:0857</Advisory>
        <Package name="java-1.7.0-oracle">java-1.7.0-oracle-1:1.7.0.79-1jpp.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:6">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0858">RHSA-2015:0858</Advisory>
        <Package name="java-1.6.0-sun">java-1.6.0-sun-1:1.6.0.95-1jpp.3.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:7">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0854">RHSA-2015:0854</Advisory>
        <Package name="java-1.8.0-oracle">java-1.8.0-oracle-1:1.8.0.45-1jpp.2.el7_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:7">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0857">RHSA-2015:0857</Advisory>
        <Package name="java-1.7.0-oracle">java-1.7.0-oracle-1:1.7.0.79-1jpp.1.el7_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras_oracle_java:7">
        <ProductName>Oracle Java for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0858">RHSA-2015:0858</Advisory>
        <Package name="java-1.6.0-sun">java-1.6.0-sun-1:1.6.0.95-1jpp.3.el7_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2015-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0807">RHSA-2015:0807</Advisory>
        <Package name="java-1.7.0-openjdk">java-1.7.0-openjdk-1:1.7.0.79-2.5.5.2.el5_11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0808">RHSA-2015:0808</Advisory>
        <Package name="java-1.6.0-openjdk">java-1.6.0-openjdk-1:1.6.0.35-1.13.7.1.el5_11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Red Hat Enterprise Linux 5 Supplementary</ProductName>
        <ReleaseDate>2015-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1006">RHSA-2015:1006</Advisory>
        <Package name="java-1.6.0-ibm">java-1.6.0-ibm-1:1.6.0.16.4-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Red Hat Enterprise Linux 5 Supplementary</ProductName>
        <ReleaseDate>2015-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1007">RHSA-2015:1007</Advisory>
        <Package name="java-1.7.0-ibm">java-1.7.0-ibm-1:1.7.0.9.0-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Red Hat Enterprise Linux 5 Supplementary</ProductName>
        <ReleaseDate>2015-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1021">RHSA-2015:1021</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.16.10-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0806">RHSA-2015:0806</Advisory>
        <Package name="java-1.7.0-openjdk">java-1.7.0-openjdk-1:1.7.0.79-2.5.5.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0808">RHSA-2015:0808</Advisory>
        <Package name="java-1.6.0-openjdk">java-1.6.0-openjdk-1:1.6.0.35-1.13.7.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0809">RHSA-2015:0809</Advisory>
        <Package name="java-1.8.0-openjdk">java-1.8.0-openjdk-1:1.8.0.45-28.b13.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0806">RHSA-2015:0806</Advisory>
        <Package name="java-1.7.0-openjdk">java-1.7.0-openjdk-1:1.7.0.79-2.5.5.1.ael7b_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0808">RHSA-2015:0808</Advisory>
        <Package name="java-1.6.0-openjdk">java-1.6.0-openjdk-1:1.6.0.35-1.13.7.1.el7_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-04-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:0809">RHSA-2015:0809</Advisory>
        <Package name="java-1.8.0-openjdk">java-1.8.0-openjdk-1:1.8.0.45-30.b13.ael7b_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.6::el5">
        <ProductName>Red Hat Satellite 5.6</ProductName>
        <ReleaseDate>2015-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1091">RHSA-2015:1091</Advisory>
        <Package name="java-1.6.0-ibm">java-1.6.0-ibm-1:1.6.0.16.4-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.7::el6">
        <ProductName>Red Hat Satellite 5.7</ProductName>
        <ReleaseDate>2015-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1091">RHSA-2015:1091</Advisory>
        <Package name="java-1.6.0-ibm">java-1.6.0-ibm-1:1.6.0.16.4-1jpp.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:6">
        <ProductName>Supplementary for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1006">RHSA-2015:1006</Advisory>
        <Package name="java-1.6.0-ibm">java-1.6.0-ibm-1:1.6.0.16.4-1jpp.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:6">
        <ProductName>Supplementary for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1020">RHSA-2015:1020</Advisory>
        <Package name="java-1.7.1-ibm">java-1.7.1-ibm-1:1.7.1.3.0-1jpp.2.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:6">
        <ProductName>Supplementary for Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2015-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1021">RHSA-2015:1021</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.16.10-1jpp.1.el6_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:7">
        <ProductName>Supplementary for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2015-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2015:1020">RHSA-2015:1020</Advisory>
        <Package name="java-1.7.1-ibm">java-1.7.1-ibm-1:1.7.1.3.0-1jpp.2.ael7b_1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1080
https://nvd.nist.gov/vuln/detail/CVE-2005-1080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1111">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-13T00:00:00</PublicDate>
    <Bugzilla id="1617604" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617604" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:378">RHSA-2005:378</Advisory>
        <Package name="cpio">cpio-0:2.5-4.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:378">RHSA-2005:378</Advisory>
        <Package name="cpio">cpio-0:2.5-8.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:806">RHSA-2005:806</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1111
https://nvd.nist.gov/vuln/detail/CVE-2005-1111
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1119">
    <Details source="Mitre" xml:lang="en:us">
Sudo VISudo 1.6.8 and earlier allows local users to corrupt arbitrary files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this a security issue, the bug can only manifest if the software is invoked on a sudoers file that is contained in a world writable directory.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1119
https://nvd.nist.gov/vuln/detail/CVE-2005-1119
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1153">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617605" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617605" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.3 and Mozilla Suite before 1.7.7, when blocking a popup, allows remote attackers to execute arbitrary code via a javascript: URL that is executed when the user selects the &quot;Show javascript&quot; option.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1153
https://nvd.nist.gov/vuln/detail/CVE-2005-1153
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1154">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617606" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617606" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary script in other domains via a setter function for a variable in the target domain, which is executed when the user visits that domain, aka &quot;Cross-site scripting through global scope pollution.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1154
https://nvd.nist.gov/vuln/detail/CVE-2005-1154
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1155">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617607" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617607" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The favicon functionality in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to execute arbitrary code via a &lt;LINK rel=&quot;icon&quot;&gt; tag with a javascript: URL in the href attribute, aka &quot;Firelinking.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1155
https://nvd.nist.gov/vuln/detail/CVE-2005-1155
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1156">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617608" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617608" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to execute arbitrary script and code via a new search plugin using sidebar.addSearchEngine, aka &quot;Firesearching 1.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1156
https://nvd.nist.gov/vuln/detail/CVE-2005-1156
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1157">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617609" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617609" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.3, Mozilla Suite before 1.7.7, and Netscape 7.2 allows remote attackers to replace existing search plugins with malicious ones using sidebar.addSearchEngine and the same filename as the target engine, which may not be displayed in the GUI, which could then be used to execute malicious script, aka &quot;Firesearching 2.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1157
https://nvd.nist.gov/vuln/detail/CVE-2005-1157
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1158">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617610" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617610" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;missing security checks&quot; in Firefox before 1.0.3 allow remote attackers to inject arbitrary Javascript into privileged pages using the _search target of the Firefox sidebar.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1158
https://nvd.nist.gov/vuln/detail/CVE-2005-1158
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1159">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617611" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617611" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The native implementations of InstallTrigger and other functions in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 do not properly verify the types of objects being accessed, which causes the Javascript interpreter to continue execution at the wrong memory address, which may allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code by passing objects of the wrong type.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1159
https://nvd.nist.gov/vuln/detail/CVE-2005-1159
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1160">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-15T00:00:00</PublicDate>
    <Bugzilla id="1617612" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617612" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The privileged &quot;chrome&quot; UI code in Firefox before 1.0.3 and Mozilla Suite before 1.7.7 allows remote attackers to gain privileges by overriding certain properties or methods of DOM nodes, as demonstrated using multiple attacks involving the eval function or the Script object.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:383">RHSA-2005:383</Advisory>
        <Package name="firefox">firefox-0:1.0.3-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-04-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:386">RHSA-2005:386</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1160
https://nvd.nist.gov/vuln/detail/CVE-2005-1160
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1174">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617613" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617613" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MIT Kerberos 5 (krb5) 1.3 through 1.4.1 Key Distribution Center (KDC) allows remote attackers to cause a denial of service (application crash) via a certain valid TCP connection that causes a free of unallocated memory.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Daniel Wachdorf and the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:567">RHSA-2005:567</Advisory>
        <Package name="krb5">krb5-0:1.3.4-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1174
https://nvd.nist.gov/vuln/detail/CVE-2005-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1175">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617614" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617614" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Daniel Wachdorf and the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:562">RHSA-2005:562</Advisory>
        <Package name="krb5">krb5-0:1.2.7-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:567">RHSA-2005:567</Advisory>
        <Package name="krb5">krb5-0:1.3.4-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1175
https://nvd.nist.gov/vuln/detail/CVE-2005-1175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1194">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-31T00:00:00</PublicDate>
    <Bugzilla id="1617615" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617615" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:381">RHSA-2005:381</Advisory>
        <Package name="nasm">nasm-0:0.98.35-3.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:381">RHSA-2005:381</Advisory>
        <Package name="nasm">nasm-0:0.98.38-3.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1194
https://nvd.nist.gov/vuln/detail/CVE-2005-1194
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1228">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-18T00:00:00</PublicDate>
    <Bugzilla id="1617616" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617616" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary directories via a .. (dot dot) in the original filename within a compressed file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-12.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:357">RHSA-2005:357</Advisory>
        <Package name="gzip">gzip-0:1.3.3-15.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1228
https://nvd.nist.gov/vuln/detail/CVE-2005-1228
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1229">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-04-20T00:00:00</PublicDate>
    <Bugzilla id="156313" url="https://bugzilla.redhat.com/show_bug.cgi?id=156313" xml:lang="en:us">
cpio directory traversal issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.
    </Details>
    <Statement xml:lang="en:us">
This is defined and documented behaviour:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156313
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1229
https://nvd.nist.gov/vuln/detail/CVE-2005-1229
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1260">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617617" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617617" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a &quot;decompression bomb&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-11.EL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:474">RHSA-2005:474</Advisory>
        <Package name="bzip2">bzip2-0:1.0.2-13.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1260
https://nvd.nist.gov/vuln/detail/CVE-2005-1260
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1261">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-05-11T00:00:00</PublicDate>
    <Bugzilla id="1617618" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617618" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:432">RHSA-2005:432</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1261
https://nvd.nist.gov/vuln/detail/CVE-2005-1261
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1262">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-11T00:00:00</PublicDate>
    <Bugzilla id="1617619" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617619" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Gaim 1.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed MSN message.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1262
https://nvd.nist.gov/vuln/detail/CVE-2005-1262
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1263">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-11T00:00:00</PublicDate>
    <Bugzilla id="1617620" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617620" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:472">RHSA-2005:472</Advisory>
        <Package name="kernel">kernel-0:2.4.21-32.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:529">RHSA-2005:529</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1263
https://nvd.nist.gov/vuln/detail/CVE-2005-1263
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1264">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617621" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617621" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:420">RHSA-2005:420</Advisory>
        <Package name="kernel">kernel-0:2.6.9-11.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1264
https://nvd.nist.gov/vuln/detail/CVE-2005-1264
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1265">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-19T00:00:00</PublicDate>
    <Bugzilla id="1617622" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617622" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1265
https://nvd.nist.gov/vuln/detail/CVE-2005-1265
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1266">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-15T00:00:00</PublicDate>
    <Bugzilla id="1617623" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617623" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache SpamAssassin 3.0.1, 3.0.2, and 3.0.3 allows remote attackers to cause a denial of service (CPU consumption and slowdown) via a message with a long Content-Type header without any boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:498">RHSA-2005:498</Advisory>
        <Package name="spamassassin">spamassassin-0:3.0.4-1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1266
https://nvd.nist.gov/vuln/detail/CVE-2005-1266
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1267">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-06-06T00:00:00</PublicDate>
    <Bugzilla id="1617624" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617624" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:505">RHSA-2005:505</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-10.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1267
https://nvd.nist.gov/vuln/detail/CVE-2005-1267
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1268">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-06-08T00:00:00</PublicDate>
    <Bugzilla id="1617625" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617625" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:582">RHSA-2005:582</Advisory>
        <Package name="httpd">httpd-0:2.0.46-46.2.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:582">RHSA-2005:582</Advisory>
        <Package name="httpd">httpd-0:2.0.52-12.1.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1268
https://nvd.nist.gov/vuln/detail/CVE-2005-1268
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1269">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617626" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617626" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Gaim before 1.3.1 allows remote attackers to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1269
https://nvd.nist.gov/vuln/detail/CVE-2005-1269
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1275">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-24T00:00:00</PublicDate>
    <Bugzilla id="1617627" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617627" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the ReadPNMImage function in pnm.c for ImageMagick 6.2.1 and earlier allows remote attackers to cause a denial of service (application crash) via a PNM file with a small colors value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:413">RHSA-2005:413</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:413">RHSA-2005:413</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1275
https://nvd.nist.gov/vuln/detail/CVE-2005-1275
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1278">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-26T00:00:00</PublicDate>
    <Bugzilla id="1617628" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617628" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:421">RHSA-2005:421</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:417">RHSA-2005:417</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-9.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1278
https://nvd.nist.gov/vuln/detail/CVE-2005-1278
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1279">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-26T00:00:00</PublicDate>
    <Bugzilla id="1617629" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617629" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:421">RHSA-2005:421</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:417">RHSA-2005:417</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-9.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1279
https://nvd.nist.gov/vuln/detail/CVE-2005-1279
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1280">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-26T00:00:00</PublicDate>
    <Bugzilla id="1617630" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617630" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:421">RHSA-2005:421</Advisory>
        <Package name="tcpdump">tcpdump-14:3.7.2-7.E3.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:417">RHSA-2005:417</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-9.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1280
https://nvd.nist.gov/vuln/detail/CVE-2005-1280
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1306">
    <Details source="Mitre" xml:lang="en:us">
The Adobe Reader control in Adobe Reader and Acrobat 7.0 and 7.0.1 allows remote attackers to determine the existence of files via Javascript containing XML script, aka the &quot;XML External Entity vulnerability.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Adobe told us this issue did not affect the Linux version of Adobe Reader.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1306
https://nvd.nist.gov/vuln/detail/CVE-2005-1306
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1344">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument.  NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program.  Therefore this may not be a vulnerability.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a vulnerability.  htdigest is not supplied setuid or setgid and should not be run from a CGI program.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1344
https://nvd.nist.gov/vuln/detail/CVE-2005-1344
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1345">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-03-04T00:00:00</PublicDate>
    <Bugzilla id="1617631" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617631" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1345
https://nvd.nist.gov/vuln/detail/CVE-2005-1345
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1409">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-02T00:00:00</PublicDate>
    <Bugzilla id="1617632" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617632" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the &quot;Character conversion vulnerability.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:433">RHSA-2005:433</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.10-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:433">RHSA-2005:433</Advisory>
        <Package name="postgresql">postgresql-0:7.4.8-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1409
https://nvd.nist.gov/vuln/detail/CVE-2005-1409
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1410">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-02T00:00:00</PublicDate>
    <Bugzilla id="1617633" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617633" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as &quot;internal&quot; even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:433">RHSA-2005:433</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.10-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:433">RHSA-2005:433</Advisory>
        <Package name="postgresql">postgresql-0:7.4.8-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1410
https://nvd.nist.gov/vuln/detail/CVE-2005-1410
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1431">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-28T00:00:00</PublicDate>
    <Bugzilla id="156856" url="https://bugzilla.redhat.com/show_bug.cgi?id=156856" xml:lang="en:us">
gnutls record packet parsing DoS [GNUTLS-SA-2005-1]
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The &quot;record packet parsing&quot; in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:430">RHSA-2005:430</Advisory>
        <Package name="gnutls">gnutls-0:1.0.20-3.2.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1431
https://nvd.nist.gov/vuln/detail/CVE-2005-1431
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1454">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617634" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617634" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:524">RHSA-2005:524</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-1.1.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:524">RHSA-2005:524</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-3.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1454
https://nvd.nist.gov/vuln/detail/CVE-2005-1454
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1455">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617635" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617635" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:524">RHSA-2005:524</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-1.1.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:524">RHSA-2005:524</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-3.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1455
https://nvd.nist.gov/vuln/detail/CVE-2005-1455
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1456">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617636" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617636" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) DHCP and (2) Telnet dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (abort).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1456
https://nvd.nist.gov/vuln/detail/CVE-2005-1456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1457">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617637" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617637" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) AIM, (2) LDAP, (3) FibreChannel, (4) GSM_MAP, (5) SRVLOC, and (6) NTLMSSP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1457
https://nvd.nist.gov/vuln/detail/CVE-2005-1457
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1458">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617638" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617638" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown &quot;other problems&quot; in the KINK dissector in Ethereal before 0.10.11 have unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1458
https://nvd.nist.gov/vuln/detail/CVE-2005-1458
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1459">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617639" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617639" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) WSP, (2) BER, (3) SMB, (4) NDPS, (5) IAX2, (6) RADIUS, (7) TCAP, (8) MRDISC, (9) 802.3 Slow, (10) SMBMailslot, or (11) SMB PIPE dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1459
https://nvd.nist.gov/vuln/detail/CVE-2005-1459
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1460">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617640" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617640" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (assert error) via an invalid protocol tree item length.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1460
https://nvd.nist.gov/vuln/detail/CVE-2005-1460
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1461">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617641" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617641" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the (1) SIP, (2) CMIP, (3) CMP, (4) CMS, (5) CRMF, (6) ESS, (7) OCSP, (8) X.509, (9) ISIS, (10) DISTCC, (11) FCELS, (12) Q.931, (13) NCP, (14) TCAP, (15) ISUP, (16) MEGACO, (17) PKIX1Explitit, (18) PKIX_Qualified, (19) Presentation dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1461
https://nvd.nist.gov/vuln/detail/CVE-2005-1461
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1462">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617642" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617642" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the ICEP dissector in Ethereal before 0.10.11 may allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1462
https://nvd.nist.gov/vuln/detail/CVE-2005-1462
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1463">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617643" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617643" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in the (1) DHCP and (2) ANSI A dissectors in Ethereal before 0.10.11 may allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1463
https://nvd.nist.gov/vuln/detail/CVE-2005-1463
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1464">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617644" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617644" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) KINK, (2) L2TP, (3) MGCP, (4) EIGRP, (5) DLSw, (6) MEGACO, (7) LMP, and (8) RSVP dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (infinite loop).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1464
https://nvd.nist.gov/vuln/detail/CVE-2005-1464
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1465">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617645" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617645" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the NCP dissector in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (long loop).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1465
https://nvd.nist.gov/vuln/detail/CVE-2005-1465
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1466">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617646" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617646" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the DICOM dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (large memory allocation) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1466
https://nvd.nist.gov/vuln/detail/CVE-2005-1466
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1467">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617647" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617647" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the NDPS dissector in Ethereal before 0.10.11 allows remote attackers to cause a denial of service (memory exhaustion) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1467
https://nvd.nist.gov/vuln/detail/CVE-2005-1467
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1468">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617648" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617648" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) WSP, (2) Q.931, (3) H.245, (4) KINK, (5) MGCP, (6) RPC, (7) SMBMailslot, and (8) SMB NETLOGON dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (crash) via unknown vectors that lead to a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1468
https://nvd.nist.gov/vuln/detail/CVE-2005-1468
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1469">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617649" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617649" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the GSM dissector in Ethereal before 0.10.11 allows remote attackers to cause the dissector to access an invalid pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1469
https://nvd.nist.gov/vuln/detail/CVE-2005-1469
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1470">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-04T00:00:00</PublicDate>
    <Bugzilla id="1617650" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617650" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unknown vulnerabilities in the (1) TZSP, (2) MGCP, (3) ISUP, (4) SMB, or (5) Bittorrent dissectors in Ethereal before 0.10.11 allow remote attackers to cause a denial of service (segmentation fault) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:427">RHSA-2005:427</Advisory>
        <Package name="ethereal">ethereal-0:0.10.11-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1470
https://nvd.nist.gov/vuln/detail/CVE-2005-1470
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1476">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-08T00:00:00</PublicDate>
    <Bugzilla id="1617651" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617651" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0.3 allows remote attackers to execute arbitrary Javascript in other domains by using an IFRAME and causing the browser to navigate to a previous javascript: URL, which can lead to arbitrary code execution when combined with CVE-2005-1477.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:434">RHSA-2005:434</Advisory>
        <Package name="firefox">firefox-0:1.0.4-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:435">RHSA-2005:435</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1476
https://nvd.nist.gov/vuln/detail/CVE-2005-1476
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1477">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-08T00:00:00</PublicDate>
    <Bugzilla id="1617652" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617652" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:434">RHSA-2005:434</Advisory>
        <Package name="firefox">firefox-0:1.0.4-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:435">RHSA-2005:435</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1477
https://nvd.nist.gov/vuln/detail/CVE-2005-1477
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1519">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-11T00:00:00</PublicDate>
    <Bugzilla id="1617653" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617653" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:415">RHSA-2005:415</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:489">RHSA-2005:489</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1519
https://nvd.nist.gov/vuln/detail/CVE-2005-1519
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1531">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-18T00:00:00</PublicDate>
    <Bugzilla id="1617654" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617654" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.4 and Mozilla Suite before 1.7.8 does not properly implement certain security checks for script injection, which allows remote attackers to execute script via &quot;Wrapped&quot; javascript: URLs, as demonstrated using (1) a javascript: URL in a view-source: URL, (2) a javascript: URL in a jar: URL, or (3) &quot;a nested variant.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:434">RHSA-2005:434</Advisory>
        <Package name="firefox">firefox-0:1.0.4-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:435">RHSA-2005:435</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1531
https://nvd.nist.gov/vuln/detail/CVE-2005-1531
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1532">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-18T00:00:00</PublicDate>
    <Bugzilla id="1617655" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617655" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.4 and Mozilla Suite before 1.7.8 do not properly limit privileges of Javascript eval and Script objects in the calling context, which allows remote attackers to conduct unauthorized activities via &quot;non-DOM property overrides,&quot; a variant of CVE-2005-1160.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:434">RHSA-2005:434</Advisory>
        <Package name="firefox">firefox-0:1.0.4-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:435">RHSA-2005:435</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1532
https://nvd.nist.gov/vuln/detail/CVE-2005-1532
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1544">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in libTIFF before 3.7.2 allows remote attackers to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1544
https://nvd.nist.gov/vuln/detail/CVE-2005-1544
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1625">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-07-06T00:00:00</PublicDate>
    <Bugzilla id="1617656" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617656" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:575">RHSA-2005:575</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:575">RHSA-2005:575</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1625
https://nvd.nist.gov/vuln/detail/CVE-2005-1625
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1636">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617657" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617657" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file's contents.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:685">RHSA-2005:685</Advisory>
        <Package name="mysql">mysql-0:4.1.12-3.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1636
https://nvd.nist.gov/vuln/detail/CVE-2005-1636
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1686">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-20T00:00:00</PublicDate>
    <Bugzilla id="1617658" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617658" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:499">RHSA-2005:499</Advisory>
        <Package name="gedit">gedit-1:2.2.2-4.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:499">RHSA-2005:499</Advisory>
        <Package name="gedit">gedit-1:2.8.1-4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1686
https://nvd.nist.gov/vuln/detail/CVE-2005-1686
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1689">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617659" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617659" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:562">RHSA-2005:562</Advisory>
        <Package name="krb5">krb5-0:1.2.7-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:567">RHSA-2005:567</Advisory>
        <Package name="krb5">krb5-0:1.3.4-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1689
https://nvd.nist.gov/vuln/detail/CVE-2005-1689
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1704">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-25T00:00:00</PublicDate>
    <Bugzilla id="1617660" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617660" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the Binary File Descriptor (BFD) library for gdb before 6.3, binutils, elfutils, and possibly other packages, allows user-assisted attackers to execute arbitrary code via a crafted object file that specifies a large number of section headers, leading to a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:659">RHSA-2005:659</Advisory>
        <Package name="binutils">binutils-0:2.14.90.0.4-39</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0368">RHSA-2006:0368</Advisory>
        <Package name="elfutils">elfutils-0:0.94.1-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:673">RHSA-2005:673</Advisory>
        <Package name="binutils">binutils-0:2.15.92.0.2-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:709">RHSA-2005:709</Advisory>
        <Package name="gdb">gdb-0:6.3.0.0-1.63</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0354">RHSA-2006:0354</Advisory>
        <Package name="elfutils">elfutils-0:0.97.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:763">RHSA-2005:763</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:763">RHSA-2005:763</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:763">RHSA-2005:763</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:763">RHSA-2005:763</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1704
https://nvd.nist.gov/vuln/detail/CVE-2005-1704
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1705">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-25T00:00:00</PublicDate>
    <Bugzilla id="1617661" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617661" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gdb before 6.3 searches the current working directory to load the .gdbinit configuration file, which allows local users to execute arbitrary commands as the user running gdb.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:709">RHSA-2005:709</Advisory>
        <Package name="gdb">gdb-0:6.3.0.0-1.63</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2005:675">RHBA-2005:675</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:801">RHSA-2005:801</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1705
https://nvd.nist.gov/vuln/detail/CVE-2005-1705
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1730">
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the OpenSSL ASN.1 parser, as used in Novell iManager 2.0.2, allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted packets, as demonstrated by &quot;OpenSSL ASN.1 brute forcer.&quot;  NOTE: this issue might overlap CVE-2004-0079, CVE-2004-0081, or CVE-2004-0112.
    </Details>
    <Statement xml:lang="en:us">
Based on our research we believe that the &quot;OpenSSL ASN.1 brute forcer.&quot; is actually exploiting flaws CVE-2003-0543, CVE-2003-0544, CVE-2003-0545.  Those issues are all addressed in Red Hat Enterprise Linux and therefore CVE-2005-1730 is a duplicate assignment.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1730
https://nvd.nist.gov/vuln/detail/CVE-2005-1730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1739">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-04-25T00:00:00</PublicDate>
    <Bugzilla id="1617662" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617662" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:480">RHSA-2005:480</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:480">RHSA-2005:480</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1739
https://nvd.nist.gov/vuln/detail/CVE-2005-1739
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1740">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-18T00:00:00</PublicDate>
    <Bugzilla id="1617663" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617663" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fixproc in Net-snmp 5.x before 5.2.1-r1 creates temporary files insecurely, which allows local users to modify the contents of those files to execute arbitrary commands, or overwrite arbitrary files via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:373">RHSA-2005:373</Advisory>
        <Package name="net-snmp">net-snmp-0:5.0.9-2.30E.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:395">RHSA-2005:395</Advisory>
        <Package name="net-snmp">net-snmp-0:5.1.2-11.EL4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1740
https://nvd.nist.gov/vuln/detail/CVE-2005-1740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1751">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-24T00:00:00</PublicDate>
    <Bugzilla id="158995" url="https://bugzilla.redhat.com/show_bug.cgi?id=158995" xml:lang="en:us">
shtool: insecure temporary file creation
    </Bugzilla>
    <CWE>CWE-377</CWE>
    <Details source="Mitre" xml:lang="en:us">
Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack on the .shtool.$$ temporary file, a different vulnerability than CVE-2005-1759.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:564">RHSA-2005:564</Advisory>
        <Package name="php">php-0:4.3.2-24.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:564">RHSA-2005:564</Advisory>
        <Package name="php">php-0:4.3.9-3.7</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nmap</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nmap</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1751
https://nvd.nist.gov/vuln/detail/CVE-2005-1751
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1753">
    <Details source="Mitre" xml:lang="en:us">
ReadMessage.jsp in JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to view other users' e-mail attachments via a direct request to /mailboxesdir/username@domainname. NOTE: Sun and Apache dispute this issue.  Sun states: &quot;The report makes references to source code and files that do not exist in the mentioned products.
    </Details>
    <Statement xml:lang="en:us">
We do not believe this is a security issue; this is a deliberate circumvention of the Javamail API. The Javamail API provides a comprehensive and secure method to retrieve mail. In this example, the author retreives the message directly from the mail directory on the filesystem.  Even if the user insists on using this incorrect way of accessing mail, then the permissions set by the dovecot and tomcat packages are enough to protect against direct access to most of the files listed in the bug report.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1753
https://nvd.nist.gov/vuln/detail/CVE-2005-1753
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1760">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-13T00:00:00</PublicDate>
    <Bugzilla id="1617664" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617664" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:502">RHSA-2005:502</Advisory>
        <Package name="sysreport">sysreport-0:1.3.7.2-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1760
https://nvd.nist.gov/vuln/detail/CVE-2005-1760
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1761">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-21T00:00:00</PublicDate>
    <Bugzilla id="1617665" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617665" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1761
https://nvd.nist.gov/vuln/detail/CVE-2005-1761
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1762">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617666" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617666" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a &quot;non-canonical&quot; address.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1762
https://nvd.nist.gov/vuln/detail/CVE-2005-1762
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1763">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-20T00:00:00</PublicDate>
    <Bugzilla id="1617667" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617667" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1763
https://nvd.nist.gov/vuln/detail/CVE-2005-1763
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1766">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-06-23T00:00:00</PublicDate>
    <Bugzilla id="1617668" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617668" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:523">RHSA-2005:523</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:523">RHSA-2005:523</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:517">RHSA-2005:517</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.5-0.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1766
https://nvd.nist.gov/vuln/detail/CVE-2005-1766
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1767">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-30T00:00:00</PublicDate>
    <Bugzilla id="1617669" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617669" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1767
https://nvd.nist.gov/vuln/detail/CVE-2005-1767
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1768">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-04T00:00:00</PublicDate>
    <Bugzilla id="1617670" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617670" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:551">RHSA-2005:551</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1768
https://nvd.nist.gov/vuln/detail/CVE-2005-1768
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1769">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-15T00:00:00</PublicDate>
    <Bugzilla id="1617671" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617671" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:595">RHSA-2005:595</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-11.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:595">RHSA-2005:595</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-12.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1769
https://nvd.nist.gov/vuln/detail/CVE-2005-1769
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1797">
    <Details source="Mitre" xml:lang="en:us">
The design of Advanced Encryption Standard (AES), aka Rijndael, allows remote attackers to recover AES keys via timing attacks on S-box lookups, which are difficult to perform in constant time in AES implementations.
    </Details>
    <Statement xml:lang="en:us">
The OpenSSL Team do not consider this issue to be a practical threat. Conducting an attack such as this has shown to be impractical outside of a controlled lab environment. If the OpenSSL Team decide to produce an update to correct this issue, we will consider including it in a future security update.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1797
https://nvd.nist.gov/vuln/detail/CVE-2005-1797
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1841">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-07T00:00:00</PublicDate>
    <Bugzilla id="1617672" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617672" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The control for Adobe Reader 5.0.9 and 5.0.10 on Linux, Solaris, HP-UX, and AIX creates temporary files with the permissions as specified in a user's umask, which could allow local users to read PDF documents of that user if the umask allows it.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:575">RHSA-2005:575</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-07-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:575">RHSA-2005:575</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1841
https://nvd.nist.gov/vuln/detail/CVE-2005-1841
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1848">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-11T00:00:00</PublicDate>
    <Bugzilla id="1617673" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617673" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:603">RHSA-2005:603</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:603">RHSA-2005:603</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:603">RHSA-2005:603</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:603">RHSA-2005:603</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1848
https://nvd.nist.gov/vuln/detail/CVE-2005-1848
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1849">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-20T00:00:00</PublicDate>
    <Bugzilla id="430649" url="https://bugzilla.redhat.com/show_bug.cgi?id=430649" xml:lang="en:us">
zlib DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:584">RHSA-2005:584</Advisory>
        <Package name="zlib">zlib-0:1.2.1.2-1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1849
https://nvd.nist.gov/vuln/detail/CVE-2005-1849
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1852">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617674" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617674" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg before 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:639">RHSA-2005:639</Advisory>
        <Package name="kdenetwork">kdenetwork-7:3.3.1-2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1852
https://nvd.nist.gov/vuln/detail/CVE-2005-1852
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1918">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2003-07-21T00:00:00</PublicDate>
    <Bugzilla id="140589" url="https://bugzilla.redhat.com/show_bug.cgi?id=140589" xml:lang="en:us">
tar archive path traversal issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an &quot;incorrect optimization&quot; that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving &quot;/../&quot; sequences with a leading &quot;/&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0195">RHSA-2006:0195</Advisory>
        <Package name="tar">tar-0:1.13.25-14.RHEL3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1918
https://nvd.nist.gov/vuln/detail/CVE-2005-1918
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1920">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-18T00:00:00</PublicDate>
    <Bugzilla id="1617675" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617675" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x through 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote attackers to obtain sensitive information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:612">RHSA-2005:612</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1920
https://nvd.nist.gov/vuln/detail/CVE-2005-1920
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1921">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-29T00:00:00</PublicDate>
    <Bugzilla id="1617676" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617676" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:564">RHSA-2005:564</Advisory>
        <Package name="php">php-0:4.3.2-24.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:564">RHSA-2005:564</Advisory>
        <Package name="php">php-0:4.3.9-3.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1921
https://nvd.nist.gov/vuln/detail/CVE-2005-1921
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1934">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-09T00:00:00</PublicDate>
    <Bugzilla id="1617677" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617677" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Gaim before 1.3.1 allows remote attackers to cause a denial of service (crash) via a malformed MSN message that leads to a memory allocation of a large size, possibly due to an integer signedness error.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1934
https://nvd.nist.gov/vuln/detail/CVE-2005-1934
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1937">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-06T00:00:00</PublicDate>
    <Bugzilla id="1617678" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617678" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in Firefox 1.0.3 and Mozilla 1.7.7 allows remote attackers to inject arbitrary Javascript from one page into the frameset of another site, aka the frame injection spoofing vulnerability, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2004-0718.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1937
https://nvd.nist.gov/vuln/detail/CVE-2005-1937
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1992">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-17T00:00:00</PublicDate>
    <Bugzilla id="1617679" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617679" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents &quot;security protection&quot; using handlers, which allows remote attackers to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:543">RHSA-2005:543</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1992
https://nvd.nist.gov/vuln/detail/CVE-2005-1992
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-1993">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-20T00:00:00</PublicDate>
    <Bugzilla id="1617680" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617680" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-06-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:535">RHSA-2005:535</Advisory>
        <Package name="sudo">sudo-0:1.6.7p5-1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:535">RHSA-2005:535</Advisory>
        <Package name="sudo">sudo-0:1.6.7p5-30.1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-1993
https://nvd.nist.gov/vuln/detail/CVE-2005-1993
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2069">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-28T00:00:00</PublicDate>
    <Bugzilla id="1617681" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617681" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:751">RHSA-2005:751</Advisory>
        <Package name="nss_ldap">nss_ldap-0:207-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:751">RHSA-2005:751</Advisory>
        <Package name="openldap">openldap-0:2.0.27-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:767">RHSA-2005:767</Advisory>
        <Package name="nss_ldap">nss_ldap-0:226-10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:767">RHSA-2005:767</Advisory>
        <Package name="openldap">openldap-0:2.2.13-4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2069
https://nvd.nist.gov/vuln/detail/CVE-2005-2069
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2088">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-12T00:00:00</PublicDate>
    <Bugzilla id="1617682" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617682" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a &quot;Transfer-Encoding: chunked&quot; header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka &quot;HTTP Request Smuggling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:582">RHSA-2005:582</Advisory>
        <Package name="httpd">httpd-0:2.0.46-46.2.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:582">RHSA-2005:582</Advisory>
        <Package name="httpd">httpd-0:2.0.52-12.1.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2088
https://nvd.nist.gov/vuln/detail/CVE-2005-2088
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2090">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-06T00:00:00</PublicDate>
    <Bugzilla id="237079" url="https://bugzilla.redhat.com/show_bug.cgi?id=237079" xml:lang="en:us">
tomcat multiple content-length header poisioning
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a &quot;Transfer-Encoding: chunked&quot; header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka &quot;HTTP Request Smuggling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:1.1-8jpp.1.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0360">RHSA-2007:0360</Advisory>
        <Package name="jbossas">jbossas-0:4.0.5-2.CP04.el4s1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2090
https://nvd.nist.gov/vuln/detail/CVE-2005-2090
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2095">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-13T00:00:00</PublicDate>
    <Bugzilla id="1617683" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617683" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:595">RHSA-2005:595</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-11.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:595">RHSA-2005:595</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.3a-12.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2095
https://nvd.nist.gov/vuln/detail/CVE-2005-2095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2096">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-06T00:00:00</PublicDate>
    <Bugzilla id="430650" url="https://bugzilla.redhat.com/show_bug.cgi?id=430650" xml:lang="en:us">
zlib DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:569">RHSA-2005:569</Advisory>
        <Package name="zlib">zlib-0:1.2.1.2-1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2096
https://nvd.nist.gov/vuln/detail/CVE-2005-2096
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2097">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-09T00:00:00</PublicDate>
    <Bugzilla id="1617684" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617684" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xpdf and kpdf do not properly validate the &quot;loca&quot; table in PDF files, which allows local users to cause a denial of service (disk consumption and hang) via a PDF file with a &quot;broken&quot; loca table, which causes a large temporary file to be created when xpdf attempts to reconstruct the information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:706">RHSA-2005:706</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.31</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:670">RHSA-2005:670</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:671">RHSA-2005:671</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:706">RHSA-2005:706</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:708">RHSA-2005:708</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2097
https://nvd.nist.gov/vuln/detail/CVE-2005-2097
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2098">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617685" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617685" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2098
https://nvd.nist.gov/vuln/detail/CVE-2005-2098
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2099">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-04T00:00:00</PublicDate>
    <Bugzilla id="1617686" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617686" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2099
https://nvd.nist.gov/vuln/detail/CVE-2005-2099
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2100">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-05T00:00:00</PublicDate>
    <Bugzilla id="1617687" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617687" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2100
https://nvd.nist.gov/vuln/detail/CVE-2005-2100
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2102">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-08T00:00:00</PublicDate>
    <Bugzilla id="1617688" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617688" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The AIM/ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) via a filename that contains invalid UTF-8 characters.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2102
https://nvd.nist.gov/vuln/detail/CVE-2005-2102
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2103">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-08-08T00:00:00</PublicDate>
    <Bugzilla id="1617689" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617689" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the AIM and ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an away message with a large number of AIM substitution strings, such as %t or %n.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:589">RHSA-2005:589</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:589">RHSA-2005:589</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:589">RHSA-2005:589</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:589">RHSA-2005:589</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2103
https://nvd.nist.gov/vuln/detail/CVE-2005-2103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2104">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-09T00:00:00</PublicDate>
    <Bugzilla id="1617690" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617690" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sysreport before 1.3.7 allows local users to obtain sensitive information via a symlink attack on a temporary directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:598">RHSA-2005:598</Advisory>
        <Package name="sysreport">sysreport-0:1.3.7.2-9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2104
https://nvd.nist.gov/vuln/detail/CVE-2005-2104
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2114">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-29T00:00:00</PublicDate>
    <Bugzilla id="1617691" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617691" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla 1.7.8, Firefox 1.0.4, Camino 0.8.4, Netscape 8.0.2, and K-Meleon 0.9, and possibly other products that use the Gecko engine, allow remote attackers to cause a denial of service (application crash) via JavaScript that repeatedly calls an empty function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2114
https://nvd.nist.gov/vuln/detail/CVE-2005-2114
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2177">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-01T00:00:00</PublicDate>
    <Bugzilla id="1617692" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617692" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:373">RHSA-2005:373</Advisory>
        <Package name="net-snmp">net-snmp-0:5.0.9-2.30E.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:395">RHSA-2005:395</Advisory>
        <Package name="net-snmp">net-snmp-0:5.1.2-11.EL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:720">RHSA-2005:720</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:720">RHSA-2005:720</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:720">RHSA-2005:720</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:720">RHSA-2005:720</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2177
https://nvd.nist.gov/vuln/detail/CVE-2005-2177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2260">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617693" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617693" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The browser user interface in Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 does not properly distinguish between user-generated events and untrusted synthetic events, which makes it easier for remote attackers to perform dangerous actions that normally could only be performed manually by the user.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2260
https://nvd.nist.gov/vuln/detail/CVE-2005-2260
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2261">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617694" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617694" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5, Thunderbird before 1.0.5, Mozilla before 1.7.9, Netscape 8.0.2, and K-Meleon 0.9 runs XBL scripts even when Javascript has been disabled, which makes it easier for remote attackers to bypass such protection.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2261
https://nvd.nist.gov/vuln/detail/CVE-2005-2261
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2262">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617696" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617696" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0.3 and 1.0.4, and Netscape 8.0.2, allows remote attackers to execute arbitrary code by tricking the user into using the &quot;Set As Wallpaper&quot; (in Firefox) or &quot;Set as Background&quot; (in Netscape) context menu on an image URL that is really a javascript: URL with an eval statement, aka &quot;Firewalling.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2262
https://nvd.nist.gov/vuln/detail/CVE-2005-2262
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2263">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617697" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617697" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The InstallTrigger.install method in Firefox before 1.0.5 and Mozilla before 1.7.9 allows remote attackers to execute a callback function in the context of another domain by forcing a page navigation after the install method has been called, which causes the callback to be run in the context of the new page and results in a same origin violation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2263
https://nvd.nist.gov/vuln/detail/CVE-2005-2263
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2264">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617698" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617698" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5 allows remote attackers to steal sensitive information by opening a malicious link in the Firefox sidebar using the _search target, then injecting script into other pages via a data: URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2264
https://nvd.nist.gov/vuln/detail/CVE-2005-2264
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2265">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617699" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617699" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 and 7.2 allows remote attackers to cause a denial of service (access violation and crash), and possibly execute arbitrary code, by calling InstallVersion.compareTo with an object instead of a string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2265
https://nvd.nist.gov/vuln/detail/CVE-2005-2265
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2266">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617700" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617700" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5 and Mozilla before 1.7.9 allows a child frame to call top.focus and other methods in a parent frame, even when the parent is in a different domain, which violates the same origin policy and allows remote attackers to steal sensitive information such as cookies and passwords from web sites whose child frames do not verify that they are in the same domain as their parents.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2266
https://nvd.nist.gov/vuln/detail/CVE-2005-2266
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2267">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617701" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617701" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5 allows remote attackers to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL, which is run in the context of the previous page, and may lead to code execution if the standalone application loads a privileged chrome: URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2267
https://nvd.nist.gov/vuln/detail/CVE-2005-2267
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2268">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-06-07T00:00:00</PublicDate>
    <Bugzilla id="1617702" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617702" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5 and Mozilla before 1.7.9 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the &quot;Dialog Origin Spoofing Vulnerability.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2268
https://nvd.nist.gov/vuln/detail/CVE-2005-2268
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2269">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617703" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617703" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5, Mozilla before 1.7.9, and Netscape 8.0.2 does not properly verify the associated types of DOM node names within the context of their namespaces, which allows remote attackers to modify certain tag properties, possibly leading to execution of arbitrary script or code, as demonstrated using an XHTML document with IMG tags with custom properties (&quot;XHTML node spoofing&quot;).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2269
https://nvd.nist.gov/vuln/detail/CVE-2005-2269
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2270">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-12T00:00:00</PublicDate>
    <Bugzilla id="1617704" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617704" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.5 and Mozilla before 1.7.9 does not properly clone base objects, which allows remote attackers to execute arbitrary code by navigating the prototype chain to reach a privileged object.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:586">RHSA-2005:586</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:587">RHSA-2005:587</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:601">RHSA-2005:601</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.6-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2270
https://nvd.nist.gov/vuln/detail/CVE-2005-2270
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2335">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617705" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617705" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:640">RHSA-2005:640</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.0-3.el3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:640">RHSA-2005:640</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.5-6.el4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2335
https://nvd.nist.gov/vuln/detail/CVE-2005-2335
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2337">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-23T00:00:00</PublicDate>
    <Bugzilla id="1617706" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617706" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:799">RHSA-2005:799</Advisory>
        <Package name="ruby">ruby-0:1.6.8-9.EL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:799">RHSA-2005:799</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2337
https://nvd.nist.gov/vuln/detail/CVE-2005-2337
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2351">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-30T00:00:00</PublicDate>
    <Bugzilla id="1768449" url="https://bugzilla.redhat.com/show_bug.cgi?id=1768449" xml:lang="en:us">
mutt: denial of service via a series of requests to temporary files
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-377</CWE>
    <Details source="Mitre" xml:lang="en:us">
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
An insecure temporary file vulnerability was found in the way mutt created temporary files under /tmp. Specifically, mutt created temporary files in an insecure way, using only predictable elements such as the hostname, user ID (uid) and process ID (pid). A local attacker could exploit this flaw to create those temporary files beforehand, causing a denial of service by preventing the user from using mutt.
    </Details>
    <Statement xml:lang="en:us">
This flaw does not affect versions of mutt as shipped with Red Hat Enterprise Linux 7 and 8 as they already include the patch.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>mutt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>mutt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mutt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mutt</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2351
https://nvd.nist.gov/vuln/detail/CVE-2005-2351
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2360">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617707" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617707" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through 0.10.11 allows remote attackers to cause a denial of service (free static memory and application crash) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2360
https://nvd.nist.gov/vuln/detail/CVE-2005-2360
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2361">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617708" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617708" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, (3) DOCSIS dissector, (4) SCTP graphs, (5) HTTP dissector, (6) DCERPC, (7) DHCP, (8) RADIUS dissector, (9) Telnet dissector, (10) IS-IS LSP dissector, or (11) NCP dissector in Ethereal 0.8.19 through 0.10.11 allows remote attackers to cause a denial of service (application crash or abort) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2361
https://nvd.nist.gov/vuln/detail/CVE-2005-2361
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2362">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617709" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617709" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability several dissectors in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a denial of service (application crash) by reassembling certain packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2362
https://nvd.nist.gov/vuln/detail/CVE-2005-2362
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2363">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617710" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617710" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, (3) DHCP, (4) MEGACO dissector, or (5) H1 dissector in Ethereal 0.8.15 through 0.10.11 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2363
https://nvd.nist.gov/vuln/detail/CVE-2005-2363
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2364">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617711" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617711" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the (1) GIOP dissector, (2) WBXML, or (3) CAMEL dissector in Ethereal 0.8.20 through 0.10.11 allows remote attackers to cause a denial of service (application crash) via certain packets that cause a null pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2364
https://nvd.nist.gov/vuln/detail/CVE-2005-2364
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2365">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617712" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617712" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a buffer overflow or a denial of service (memory consumption) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2365
https://nvd.nist.gov/vuln/detail/CVE-2005-2365
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2366">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617713" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617713" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows remote attackers to cause a denial of service (abort or infinite loop) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2366
https://nvd.nist.gov/vuln/detail/CVE-2005-2366
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2367">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617714" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617714" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the proto_item_set_text function in Ethereal 0.9.4 through 0.10.11, as used in multiple dissectors, allows remote attackers to write to arbitrary memory locations and gain privileges via a crafted AFP packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:687">RHSA-2005:687</Advisory>
        <Package name="ethereal">ethereal-0:0.10.12-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2367
https://nvd.nist.gov/vuln/detail/CVE-2005-2367
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2368">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-25T00:00:00</PublicDate>
    <Bugzilla id="1617715" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617715" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:745">RHSA-2005:745</Advisory>
        <Package name="vim">vim-1:6.3.046-0.30E.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:745">RHSA-2005:745</Advisory>
        <Package name="vim">vim-1:6.3.046-0.40E.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2368
https://nvd.nist.gov/vuln/detail/CVE-2005-2368
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2369">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617716" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617716" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer signedness errors in libgadu, as used in ekg before 1.6rc2 and other packages, may allow remote attackers to cause a denial of service or execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:639">RHSA-2005:639</Advisory>
        <Package name="kdenetwork">kdenetwork-7:3.3.1-2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2369
https://nvd.nist.gov/vuln/detail/CVE-2005-2369
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2370">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617717" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617717" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;memory alignment errors&quot; in libgadu, as used in ekg before 1.6rc2, Gaim before 1.5.0, and other packages, allows remote attackers to cause a denial of service (bus error) on certain architectures such as SPARC via an incoming message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:639">RHSA-2005:639</Advisory>
        <Package name="kdenetwork">kdenetwork-7:3.3.1-2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2370
https://nvd.nist.gov/vuln/detail/CVE-2005-2370
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2395">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-01-17T00:00:00</PublicDate>
    <Bugzilla id="887259" url="https://bugzilla.redhat.com/show_bug.cgi?id=887259" xml:lang="en:us">
firefox: Does not choose the challenge with the strongest authentication scheme available as required by RFC2617
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.0.4 and 1.0.5 does not choose the challenge with the strongest authentication scheme available as required by RFC2617, which might cause credentials to be sent in plaintext even if an encrypted channel is available.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2395
https://nvd.nist.gov/vuln/detail/CVE-2005-2395
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2448">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-21T00:00:00</PublicDate>
    <Bugzilla id="1617718" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617718" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple &quot;endianness errors&quot; in libgadu in ekg before 1.6rc2 allow remote attackers to cause a denial of service (invalid behavior in applications) on big-endian systems.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:639">RHSA-2005:639</Advisory>
        <Package name="kdenetwork">kdenetwork-7:3.3.1-2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2448
https://nvd.nist.gov/vuln/detail/CVE-2005-2448
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2456">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-25T00:00:00</PublicDate>
    <Bugzilla id="1617719" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617719" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-&gt;dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-&gt;sk_policy array.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2456
https://nvd.nist.gov/vuln/detail/CVE-2005-2456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2458">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>1999-06-25T00:00:00</PublicDate>
    <Bugzilla id="1617720" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617720" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with &quot;improper tables&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0144">RHSA-2006:0144</Advisory>
        <Package name="kernel">kernel-0:2.4.21-40.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2458
https://nvd.nist.gov/vuln/detail/CVE-2005-2458
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2470">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-08-16T00:00:00</PublicDate>
    <Bugzilla id="1617721" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617721" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in a &quot;core application plug-in&quot; for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:750">RHSA-2005:750</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:750">RHSA-2005:750</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2470
https://nvd.nist.gov/vuln/detail/CVE-2005-2470
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2471">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-24T00:00:00</PublicDate>
    <Bugzilla id="1617722" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617722" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pstopnm in netpbm does not properly use the &quot;-dSAFER&quot; option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:743">RHSA-2005:743</Advisory>
        <Package name="netpbm">netpbm-0:9.24-11.30.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:743">RHSA-2005:743</Advisory>
        <Package name="netpbm">netpbm-0:10.25-2.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2471
https://nvd.nist.gov/vuln/detail/CVE-2005-2471
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2475">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-02T00:00:00</PublicDate>
    <Bugzilla id="1617723" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617723" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in Unzip 5.52 allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by Unzip after the decompression is complete.
    </Details>
    <Statement xml:lang="en:us">
This issue was addressed in unzip packages as shipped with Red Hat Enterprise Linux 3 and 4 via RHBA-2007:0418 and RHSA-2007:0203 respectively.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-11T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0418">RHBA-2007:0418</Advisory>
        <Package name="unzip">unzip-0:5.50-35.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0203">RHSA-2007:0203</Advisory>
        <Package name="unzip">unzip-0:5.51-9.EL4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2475
https://nvd.nist.gov/vuln/detail/CVE-2005-2475
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2490">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-08T00:00:00</PublicDate>
    <Bugzilla id="1617724" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617724" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2490
https://nvd.nist.gov/vuln/detail/CVE-2005-2490
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2491">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-08-01T00:00:00</PublicDate>
    <Bugzilla id="430638" url="https://bugzilla.redhat.com/show_bug.cgi?id=430638" xml:lang="en:us">
pcre heap overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:761">RHSA-2005:761</Advisory>
        <Package name="pcre">pcre-0:3.9-10.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0197">RHSA-2006:0197</Advisory>
        <Package name="python">python-0:2.2.3-6.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:358">RHSA-2005:358</Advisory>
        <Package name="exim">exim-0:4.43-1.RHEL4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:761">RHSA-2005:761</Advisory>
        <Package name="pcre">pcre-0:4.5-3.2.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0197">RHSA-2006:0197</Advisory>
        <Package name="python">python-0:2.3.4-14.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2491
https://nvd.nist.gov/vuln/detail/CVE-2005-2491
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2492">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617725" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617725" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2492
https://nvd.nist.gov/vuln/detail/CVE-2005-2492
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2494">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-09-05T00:00:00</PublicDate>
    <Bugzilla id="1617726" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617726" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0582">RHSA-2006:0582</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-5.13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2494
https://nvd.nist.gov/vuln/detail/CVE-2005-2494
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2495">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-08T00:00:00</PublicDate>
    <Bugzilla id="1617727" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617727" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:501">RHSA-2005:501</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-95.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:396">RHSA-2005:396</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:329">RHSA-2005:329</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:329">RHSA-2005:329</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:329">RHSA-2005:329</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:329">RHSA-2005:329</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2495
https://nvd.nist.gov/vuln/detail/CVE-2005-2495
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2496">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-25T00:00:00</PublicDate>
    <Bugzilla id="1617728" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617728" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0393">RHSA-2006:0393</Advisory>
        <Package name="ntp">ntp-0:4.2.0.a.20040617-4.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2496
https://nvd.nist.gov/vuln/detail/CVE-2005-2496
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2498">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-14T00:00:00</PublicDate>
    <Bugzilla id="1617729" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617729" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:748">RHSA-2005:748</Advisory>
        <Package name="php">php-0:4.3.2-25.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:748">RHSA-2005:748</Advisory>
        <Package name="php">php-0:4.3.9-3.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2498
https://nvd.nist.gov/vuln/detail/CVE-2005-2498
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2499">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-12T00:00:00</PublicDate>
    <Bugzilla id="1617730" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617730" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
slocate before 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:345">RHSA-2005:345</Advisory>
        <Package name="slocate">slocate-0:2.7-3.RHEL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:346">RHSA-2005:346</Advisory>
        <Package name="slocate">slocate-0:2.7-13.el4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:747">RHSA-2005:747</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:747">RHSA-2005:747</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:747">RHSA-2005:747</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:747">RHSA-2005:747</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2499
https://nvd.nist.gov/vuln/detail/CVE-2005-2499
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2541">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-08-04T00:00:00</PublicDate>
    <Bugzilla id="1974387" url="https://bugzilla.redhat.com/show_bug.cgi?id=1974387" xml:lang="en:us">
tar: does not properly warn the user when extracting setuid or setgid files
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>7.0</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <Details source="Mitre" xml:lang="en:us">
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in tar utility that can allow the root user to extract files with preserved setuid and setgid permissions without any warning. This behavior can lead to the creation of malicious setuid executables owned by root from a crafted tar file, posing significant security risks.
    </Details>
    <Statement xml:lang="en:us">
Currently, there are no plans to change tar behaviour to strip setuid and setgid bits when extracting archives.

This vulnerability is considered moderate rather than important because the exploitation scenario requires specific conditions: the `tar` extraction must be performed by the root user, and the tarball itself must be crafted maliciously with setuid or setgid bits. In typical use cases, users do not routinely extract untrusted tar files as root, reducing the likelihood of exploitation. Additionally, non-root extractions do not preserve these bits unless explicitly requested with the `-p` option.
    </Statement>
    <Mitigation xml:lang="en:us">
To mitigate the risks associated with this vulnerability, avoid extracting tar files as the root user, especially when dealing with untrusted sources. Instead, perform extractions as a non-root user or in a restricted environment. Use a dedicated, empty directory for extracting archives to prevent accidental exposure of sensitive files. After extraction, review the file permissions to check for unexpected setuid or setgid bits before granting access. When extraction as root is necessary, use the --no-same-permissions option to prevent preserving the setuid and setgid bits.
    </Mitigation>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tar</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tar</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tar</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tar</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tar</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2541
https://nvd.nist.gov/vuln/detail/CVE-2005-2541
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2547">
    <Details source="Mitre" xml:lang="en:us">
security.c in hcid for BlueZ 2.16, 2.17, and 2.18 allows remote attackers to execute arbitrary commands via shell metacharacters in the Bluetooth device name when invoking the PIN helper.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the version of BlueZ as shipped with Red Hat Enterprise Linux 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2547
https://nvd.nist.gov/vuln/detail/CVE-2005-2547
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2549">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-10T00:00:00</PublicDate>
    <Bugzilla id="1617731" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617731" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:267">RHSA-2005:267</Advisory>
        <Package name="evolution">evolution-0:1.4.5-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:267">RHSA-2005:267</Advisory>
        <Package name="evolution">evolution-0:2.0.2-16.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2549
https://nvd.nist.gov/vuln/detail/CVE-2005-2549
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2550">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-08-10T00:00:00</PublicDate>
    <Bugzilla id="1617732" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617732" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Evolution 1.4 through 2.3.6.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:267">RHSA-2005:267</Advisory>
        <Package name="evolution">evolution-0:1.4.5-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:267">RHSA-2005:267</Advisory>
        <Package name="evolution">evolution-0:2.0.2-16.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2550
https://nvd.nist.gov/vuln/detail/CVE-2005-2550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2553">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-06T00:00:00</PublicDate>
    <Bugzilla id="1617733" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617733" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2553
https://nvd.nist.gov/vuln/detail/CVE-2005-2553
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2555">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-06T00:00:00</PublicDate>
    <Bugzilla id="1617734" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617734" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2555
https://nvd.nist.gov/vuln/detail/CVE-2005-2555
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2628">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-11-04T00:00:00</PublicDate>
    <Bugzilla id="1617735" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617735" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:835">RHSA-2005:835</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:835">RHSA-2005:835</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2628
https://nvd.nist.gov/vuln/detail/CVE-2005-2628
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2629">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617736" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617736" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:788">RHSA-2005:788</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.6-0.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2629
https://nvd.nist.gov/vuln/detail/CVE-2005-2629
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2641">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-22T00:00:00</PublicDate>
    <Bugzilla id="1617737" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617737" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges.  NOTE: CVE-2005-2497 had also been assigned to this issue, but CVE-2005-2641 is the correct candidate.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:767">RHSA-2005:767</Advisory>
        <Package name="nss_ldap">nss_ldap-0:226-10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:767">RHSA-2005:767</Advisory>
        <Package name="openldap">openldap-0:2.2.13-4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2641
https://nvd.nist.gov/vuln/detail/CVE-2005-2641
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2642">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the mutt_decode_xbit function in Handler.c for Mutt 1.5.10 allows remote attackers to execute arbitrary code, possibly due to interactions with libiconv or gettext.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the Linux versions of Mutt.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2642
https://nvd.nist.gov/vuln/detail/CVE-2005-2642
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2665">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-08-20T00:00:00</PublicDate>
    <Bugzilla id="1617738" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617738" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in expires.c in Elm 2.5 PL5 through PL7, and possibly other versions, allows remote attackers to execute arbitrary code via an e-mail message with a long Expires header.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:755">RHSA-2005:755</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:755">RHSA-2005:755</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2665
https://nvd.nist.gov/vuln/detail/CVE-2005-2665
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2666">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-07T00:00:00</PublicDate>
    <Bugzilla id="162681" url="https://bugzilla.redhat.com/show_bug.cgi?id=162681" xml:lang="en:us">
openssh vulnerable to known_hosts address harvesting
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate a list of additional targets that are more likely to have the same password or key.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0257">RHSA-2007:0257</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.20</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2666
https://nvd.nist.gov/vuln/detail/CVE-2005-2666
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2672">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-14T00:00:00</PublicDate>
    <Bugzilla id="1617739" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617739" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pwmconfig in LM_sensors before 2.9.1 creates temporary files insecurely, which allows local users to overwrite arbitrary files via a symlink attack on the fancontrol temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:825">RHSA-2005:825</Advisory>
        <Package name="lm_sensors">lm_sensors-0:2.8.7-2.40.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2672
https://nvd.nist.gov/vuln/detail/CVE-2005-2672
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2693">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-08-19T00:00:00</PublicDate>
    <Bugzilla id="1617740" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617740" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cvsbug in CVS 1.12.12 and earlier creates temporary files insecurely, which allows local users to overwrite arbitrary files and execute arbitrary code via a symlink attack.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:756">RHSA-2005:756</Advisory>
        <Package name="cvs">cvs-0:1.11.2-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:756">RHSA-2005:756</Advisory>
        <Package name="cvs">cvs-0:1.11.17-8.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2693
https://nvd.nist.gov/vuln/detail/CVE-2005-2693
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2700">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-30T00:00:00</PublicDate>
    <Bugzilla id="1617741" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617741" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ssl_engine_kernel.c in mod_ssl before 2.8.24, when using &quot;SSLVerifyClient optional&quot; in the global virtual host configuration, does not properly enforce &quot;SSLVerifyClient require&quot; in a per-location context, which allows remote attackers to bypass intended access restrictions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:608">RHSA-2005:608</Advisory>
        <Package name="httpd">httpd-0:2.0.46-46.3.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:608">RHSA-2005:608</Advisory>
        <Package name="httpd">httpd-0:2.0.52-12.2.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:773">RHSA-2005:773</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:773">RHSA-2005:773</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:773">RHSA-2005:773</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:773">RHSA-2005:773</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:816">RHSA-2005:816</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2700
https://nvd.nist.gov/vuln/detail/CVE-2005-2700
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2701">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617742" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617742" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2701
https://nvd.nist.gov/vuln/detail/CVE-2005-2701
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2702">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617743" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617743" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with &quot;zero-width non-joiner&quot; characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2702
https://nvd.nist.gov/vuln/detail/CVE-2005-2702
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2703">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617744" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617744" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2703
https://nvd.nist.gov/vuln/detail/CVE-2005-2703
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2704">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617746" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617746" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2704
https://nvd.nist.gov/vuln/detail/CVE-2005-2704
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2705">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617747" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617747" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote attackers to execute arbitrary code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2705
https://nvd.nist.gov/vuln/detail/CVE-2005-2705
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2706">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617748" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617748" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2706
https://nvd.nist.gov/vuln/detail/CVE-2005-2706
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2707">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="1617749" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617749" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2707
https://nvd.nist.gov/vuln/detail/CVE-2005-2707
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2708">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-28T00:00:00</PublicDate>
    <Bugzilla id="1617750" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617750" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2708
https://nvd.nist.gov/vuln/detail/CVE-2005-2708
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2709">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-08T14:00:00</PublicDate>
    <Bugzilla id="1617751" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617751" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2709
https://nvd.nist.gov/vuln/detail/CVE-2005-2709
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2710">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-09-26T00:00:00</PublicDate>
    <Bugzilla id="1617752" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617752" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:788">RHSA-2005:788</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.6-0.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2710
https://nvd.nist.gov/vuln/detail/CVE-2005-2710
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2728">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-07-07T00:00:00</PublicDate>
    <Bugzilla id="1617753" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617753" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:608">RHSA-2005:608</Advisory>
        <Package name="httpd">httpd-0:2.0.46-46.3.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:608">RHSA-2005:608</Advisory>
        <Package name="httpd">httpd-0:2.0.52-12.2.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2728
https://nvd.nist.gov/vuln/detail/CVE-2005-2728
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2794">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-01T00:00:00</PublicDate>
    <Bugzilla id="1617754" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617754" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2794
https://nvd.nist.gov/vuln/detail/CVE-2005-2794
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2796">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-01T00:00:00</PublicDate>
    <Bugzilla id="1617755" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617755" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:766">RHSA-2005:766</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2796
https://nvd.nist.gov/vuln/detail/CVE-2005-2796
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2797">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding (&quot;-D&quot; option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 2.1, 3 or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2797
https://nvd.nist.gov/vuln/detail/CVE-2005-2797
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2798">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-01T00:00:00</PublicDate>
    <Bugzilla id="1617757" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617757" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect Red Hat Enterprise Linux 2.1 and 3.

This flaw was fixed in Red Hat Enterprise Linux 4 via errata RHSA-2005:527:
http://rhn.redhat.com/errata/RHSA-2005-527.html
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:527">RHSA-2005:527</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2798
https://nvd.nist.gov/vuln/detail/CVE-2005-2798
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2800">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-08-27T00:00:00</PublicDate>
    <Bugzilla id="1617758" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617758" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2800
https://nvd.nist.gov/vuln/detail/CVE-2005-2800
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2801">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-05T00:00:00</PublicDate>
    <Bugzilla id="1617759" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617759" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0144">RHSA-2006:0144</Advisory>
        <Package name="kernel">kernel-0:2.4.21-40.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2801
https://nvd.nist.gov/vuln/detail/CVE-2005-2801
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2871">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617760" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617760" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the International Domain Name (IDN) support in Mozilla Firefox 1.0.6 and earlier, and Netscape 8.0.3.3 and 7.2, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a hostname with all &quot;soft&quot; hyphens (character 0xAD), which is not properly handled by the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:768">RHSA-2005:768</Advisory>
        <Package name="firefox">firefox-0:1.0.6-1.4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2871
https://nvd.nist.gov/vuln/detail/CVE-2005-2871
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2872">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-09T00:00:00</PublicDate>
    <Bugzilla id="1617761" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617761" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2872
https://nvd.nist.gov/vuln/detail/CVE-2005-2872
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2873">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-05-09T00:00:00</PublicDate>
    <Bugzilla id="1617762" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617762" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ipt_recent kernel module (ipt_recent.c) in Linux kernel 2.6.12 and earlier does not properly perform certain time tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early, a different vulnerability than CVE-2005-2872.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2873
https://nvd.nist.gov/vuln/detail/CVE-2005-2873
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2874">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-01-07T00:00:00</PublicDate>
    <Bugzilla id="1617763" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617763" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a &quot;..\..&quot; URL in an HTTP request.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:772">RHSA-2005:772</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2874
https://nvd.nist.gov/vuln/detail/CVE-2005-2874
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2876">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-13T00:00:00</PublicDate>
    <Bugzilla id="1617764" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617764" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:782">RHSA-2005:782</Advisory>
        <Package name="util-linux">util-linux-0:2.11y-31.11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:782">RHSA-2005:782</Advisory>
        <Package name="util-linux">util-linux-0:2.12a-16.EL4.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2876
https://nvd.nist.gov/vuln/detail/CVE-2005-2876
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2917">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-15T00:00:00</PublicDate>
    <Bugzilla id="1617765" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617765" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0045">RHSA-2006:0045</Advisory>
        <Package name="squid">squid-7:2.5.STABLE3-6.3E.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0052">RHSA-2006:0052</Advisory>
        <Package name="squid">squid-7:2.5.STABLE6-3.4E.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2917
https://nvd.nist.gov/vuln/detail/CVE-2005-2917
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2922">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-03-22T00:00:00</PublicDate>
    <Bugzilla id="1617766" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617766" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:762">RHSA-2005:762</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:788">RHSA-2005:788</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.6-0.EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2922
https://nvd.nist.gov/vuln/detail/CVE-2005-2922
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2929">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-11-11T16:45:00</PublicDate>
    <Bugzilla id="172972" url="https://bugzilla.redhat.com/show_bug.cgi?id=172972" xml:lang="en:us">
lynx arbitrary command execution
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:839">RHSA-2005:839</Advisory>
        <Package name="lynx">lynx-0:2.8.5-11.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:839">RHSA-2005:839</Advisory>
        <Package name="lynx">lynx-0:2.8.5-18.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2929
https://nvd.nist.gov/vuln/detail/CVE-2005-2929
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2933">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-04T00:00:00</PublicDate>
    <Bugzilla id="1617767" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617767" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (&quot;) character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:850">RHSA-2005:850</Advisory>
        <Package name="imap">imap-1:2002d-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:848">RHSA-2005:848</Advisory>
        <Package name="libc-client">libc-client-0:2002e-14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2933
https://nvd.nist.gov/vuln/detail/CVE-2005-2933
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2946">
    <Details source="Mitre" xml:lang="en:us">
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169803

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2946
https://nvd.nist.gov/vuln/detail/CVE-2005-2946
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2959">
    <Details source="Mitre" xml:lang="en:us">
Incomplete blacklist vulnerability in sudo 1.6.8 and earlier allows local users to gain privileges via the (1) SHELLOPTS and (2) PS4 environment variables before executing a bash script on behalf of another user, which are not cleared even though other variables are.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2959
https://nvd.nist.gov/vuln/detail/CVE-2005-2959
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2968">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-06T00:00:00</PublicDate>
    <Bugzilla id="1617768" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617768" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0.6 and Mozilla 1.7.10 allows attackers to execute arbitrary commands via shell metacharacters in a URL that is provided to the browser on the command line, which is sent unfiltered to bash.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of Mozilla and Firefox as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:791">RHSA-2005:791</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2968
https://nvd.nist.gov/vuln/detail/CVE-2005-2968
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2969">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-11T00:00:00</PublicDate>
    <Bugzilla id="430660" url="https://bugzilla.redhat.com/show_bug.cgi?id=430660" xml:lang="en:us">
openssl mitm downgrade attack
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:800">RHSA-2005:800</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2969
https://nvd.nist.gov/vuln/detail/CVE-2005-2969
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2970">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-25T00:00:00</PublicDate>
    <Bugzilla id="1617769" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617769" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.46-56.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.52-22.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2970
https://nvd.nist.gov/vuln/detail/CVE-2005-2970
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2973">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-04T00:00:00</PublicDate>
    <Bugzilla id="1617770" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617770" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2973
https://nvd.nist.gov/vuln/detail/CVE-2005-2973
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2974">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-03T00:00:00</PublicDate>
    <Bugzilla id="494826" url="https://bugzilla.redhat.com/show_bug.cgi?id=494826" xml:lang="en:us">
giflib/libunfig: NULL pointer dereference crash
    </Bugzilla>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:828">RHSA-2005:828</Advisory>
        <Package name="libungif">libungif-0:4.1.0-15.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:828">RHSA-2005:828</Advisory>
        <Package name="libungif">libungif-0:4.1.3-1.el4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0444">RHSA-2009:0444</Advisory>
        <Package name="giflib">giflib-0:4.1.3-7.1.el5_3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2974
https://nvd.nist.gov/vuln/detail/CVE-2005-2974
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2975">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-11-15T14:00:00</PublicDate>
    <Bugzilla id="1617771" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617771" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-13.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:811">RHSA-2005:811</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-17.el4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:811">RHSA-2005:811</Advisory>
        <Package name="gtk2">gtk2-0:2.4.13-18</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2975
https://nvd.nist.gov/vuln/detail/CVE-2005-2975
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2976">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-11-15T14:00:00</PublicDate>
    <Bugzilla id="1617772" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617772" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-13.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-17.el4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2976
https://nvd.nist.gov/vuln/detail/CVE-2005-2976
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2977">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-26T00:00:00</PublicDate>
    <Bugzilla id="1617773" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617773" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SELinux version of PAM before 0.78 r3 allows local users to perform brute force password guessing attacks via unix_chkpwd, which does not log failed guesses or delay its responses.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:805">RHSA-2005:805</Advisory>
        <Package name="pam">pam-0:0.77-66.13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2977
https://nvd.nist.gov/vuln/detail/CVE-2005-2977
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2978">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-18T00:00:00</PublicDate>
    <Bugzilla id="1617774" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617774" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:793">RHSA-2005:793</Advisory>
        <Package name="netpbm">netpbm-0:10.25-2.EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2978
https://nvd.nist.gov/vuln/detail/CVE-2005-2978
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-2991">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2021-11-09T00:00:00</PublicDate>
    <Bugzilla id="2023347" url="https://bugzilla.redhat.com/show_bug.cgi?id=2023347" xml:lang="en:us">
ncompress: insecure tmp file handling may lead to file overwrite
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.0</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-59</CWE>
    <Details source="Mitre" xml:lang="en:us">
ncompress 4.2.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files using (1) zdiff or (2) zcmp, a different vulnerability than CVE-2004-0970.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the ncompress packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncompress</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncompress</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncompress</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-2991
https://nvd.nist.gov/vuln/detail/CVE-2005-2991
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3011">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2000-02-09T00:00:00</PublicDate>
    <Bugzilla id="1617775" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617775" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sort_offline function for texindex in texinfo 4.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
    </Details>
    <Statement xml:lang="en:us">
Updated packages to correct this issue are available along with our advisory:
http://rhn.redhat.com/errata/CVE-2005-3011.html

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.0b-3.el2.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.5-3.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.7-5.el4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3011
https://nvd.nist.gov/vuln/detail/CVE-2005-3011
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3044">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617776" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617776" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3044
https://nvd.nist.gov/vuln/detail/CVE-2005-3044
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3053">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-01T00:00:00</PublicDate>
    <Bugzilla id="1617777" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617777" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3053
https://nvd.nist.gov/vuln/detail/CVE-2005-3053
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3054">
    <Details source="Mitre" xml:lang="en:us">
fopen_wrappers.c in PHP 4.4.0, and possibly other versions, does not properly restrict access to other directories when the open_basedir directive includes a trailing slash, which allows PHP scripts in one directory to access files in other directories whose names are substrings of the original directory.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3054
https://nvd.nist.gov/vuln/detail/CVE-2005-3054
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3055">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-25T00:00:00</PublicDate>
    <Bugzilla id="1617778" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617778" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3055
https://nvd.nist.gov/vuln/detail/CVE-2005-3055
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3088">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-21T00:00:00</PublicDate>
    <Bugzilla id="1617779" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617779" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fetchmailconf before 1.49 in fetchmail 6.2.0, 6.2.5 and 6.2.5.2 creates configuration files with insecure world-readable permissions, which allows local users to obtain sensitive information such as passwords.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-10-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:823">RHSA-2005:823</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-10-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:823">RHSA-2005:823</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-10-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:823">RHSA-2005:823</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-10-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:823">RHSA-2005:823</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3088
https://nvd.nist.gov/vuln/detail/CVE-2005-3088
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3089">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-25T22:56:00</PublicDate>
    <Bugzilla id="1617780" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617780" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.0.6 allows attackers to cause a denial of service (crash) via a Proxy Auto-Config (PAC) script that uses an eval statement. NOTE: it is not clear whether an untrusted party has any role in triggering this issue, so it might not be a vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:785">RHSA-2005:785</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-09-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:789">RHSA-2005:789</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3089
https://nvd.nist.gov/vuln/detail/CVE-2005-3089
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3105">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-28T00:00:00</PublicDate>
    <Bugzilla id="1617781" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617781" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mprotect code (mprotect.c) in Linux 2.6 on Itanium IA64 Montecito processors does not properly maintain cache coherency as required by the architecture, which allows local users to cause a denial of service and possibly corrupt data by modifying PTE protections.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3105
https://nvd.nist.gov/vuln/detail/CVE-2005-3105
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3106">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-01-15T00:00:00</PublicDate>
    <Bugzilla id="1617782" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617782" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3106
https://nvd.nist.gov/vuln/detail/CVE-2005-3106
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3107">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-11T00:00:00</PublicDate>
    <Bugzilla id="1617783" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617783" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fs/exec.c in Linux 2.6, when one thread is tracing another thread that shares the same memory map, might allow local users to cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:420">RHSA-2005:420</Advisory>
        <Package name="kernel">kernel-0:2.6.9-11.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3107
https://nvd.nist.gov/vuln/detail/CVE-2005-3107
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3108">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-17T00:00:00</PublicDate>
    <Bugzilla id="1617784" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617784" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to cause a denial of service or an information leak via an ioremap on a certain memory map that causes the iounmap to perform a lookup of a page that does not exist.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3108
https://nvd.nist.gov/vuln/detail/CVE-2005-3108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3109">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-01T00:00:00</PublicDate>
    <Bugzilla id="1617786" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617786" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3109
https://nvd.nist.gov/vuln/detail/CVE-2005-3109
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3110">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-03-14T00:00:00</PublicDate>
    <Bugzilla id="1617787" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617787" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3110
https://nvd.nist.gov/vuln/detail/CVE-2005-3110
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3119">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-08T00:00:00</PublicDate>
    <Bugzilla id="1617788" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617788" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3119
https://nvd.nist.gov/vuln/detail/CVE-2005-3119
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3120">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2005-10-17T00:00:00</PublicDate>
    <Bugzilla id="170253" url="https://bugzilla.redhat.com/show_bug.cgi?id=170253" xml:lang="en:us">
CAN-2005-3120 lynx buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:803">RHSA-2005:803</Advisory>
        <Package name="lynx">lynx-0:2.8.5-11.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:803">RHSA-2005:803</Advisory>
        <Package name="lynx">lynx-0:2.8.5-18.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3120
https://nvd.nist.gov/vuln/detail/CVE-2005-3120
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3178">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-05T00:00:00</PublicDate>
    <Bugzilla id="1617789" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617789" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code via a long title name in a NIFF file, which triggers the overflow during (1) zoom, (2) reduce, or (3) rotate operations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:802">RHSA-2005:802</Advisory>
        <Package name="xloadimage">xloadimage-0:4.1-36.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:802">RHSA-2005:802</Advisory>
        <Package name="xloadimage">xloadimage-0:4.1-36.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3178
https://nvd.nist.gov/vuln/detail/CVE-2005-3178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3180">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-04T00:00:00</PublicDate>
    <Bugzilla id="1617790" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617790" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3180
https://nvd.nist.gov/vuln/detail/CVE-2005-3180
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3181">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-07T00:00:00</PublicDate>
    <Bugzilla id="1617791" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617791" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:808">RHSA-2005:808</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3181
https://nvd.nist.gov/vuln/detail/CVE-2005-3181
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3183">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-07T00:00:00</PublicDate>
    <Bugzilla id="170518" url="https://bugzilla.redhat.com/show_bug.cgi?id=170518" xml:lang="en:us">
Multiple bugs in libwww - one exploitable - in Library/src/HTBound.c
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTBoundary_put_block function in HTBound.c for W3C libwww (w3c-libwww) allows remote servers to cause a denial of service (segmentation fault) via a crafted multipart/byteranges MIME message that triggers an out-of-bounds read.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which are in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0208">RHSA-2007:0208</Advisory>
        <Package name="w3c-libwww">w3c-libwww-0:5.4.0-10.1.RHEL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3183
https://nvd.nist.gov/vuln/detail/CVE-2005-3183
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3184">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617793" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617793" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow vulnerability in the unicode_to_bytes in the Service Location Protocol (srvloc) dissector (packet-srvloc.c) in Ethereal allows remote attackers to execute arbitrary code via a srvloc packet with a modified length value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3184
https://nvd.nist.gov/vuln/detail/CVE-2005-3184
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3185">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-12T00:00:00</PublicDate>
    <Bugzilla id="1617794" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617794" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:807">RHSA-2005:807</Advisory>
        <Package name="curl">curl-0:7.10.6-7.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:812">RHSA-2005:812</Advisory>
        <Package name="wget">wget-0:1.10.2-0.30E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:807">RHSA-2005:807</Advisory>
        <Package name="curl">curl-0:7.12.1-6.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:812">RHSA-2005:812</Advisory>
        <Package name="wget">wget-0:1.10.2-0.40E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3185
https://nvd.nist.gov/vuln/detail/CVE-2005-3185
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3186">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-11-03T00:00:00</PublicDate>
    <Bugzilla id="1617795" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617795" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-13.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:811">RHSA-2005:811</Advisory>
        <Package name="gtk2">gtk2-0:2.2.4-19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:810">RHSA-2005:810</Advisory>
        <Package name="gdk-pixbuf">gdk-pixbuf-1:0.22.0-17.el4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:811">RHSA-2005:811</Advisory>
        <Package name="gtk2">gtk2-0:2.4.13-18</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3186
https://nvd.nist.gov/vuln/detail/CVE-2005-3186
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3191">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-06T00:00:00</PublicDate>
    <Bugzilla id="1617796" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617796" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Derek B. Noonburg for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.34</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:867">RHSA-2005:867</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3191
https://nvd.nist.gov/vuln/detail/CVE-2005-3191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3192">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-06T00:00:00</PublicDate>
    <Bugzilla id="1617797" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617797" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Derek B. Noonburg for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.34</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:867">RHSA-2005:867</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3192
https://nvd.nist.gov/vuln/detail/CVE-2005-3192
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3193">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-06T00:00:00</PublicDate>
    <Bugzilla id="1617798" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617798" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the JPXStream::readCodestream function in the JPX stream parsing code (JPXStream.c) for xpdf 3.01 and earlier, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, (4) CUPS, and (5) libextractor allows user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with large size values that cause insufficient memory to be allocated.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Derek B. Noonburg for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.34</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:867">RHSA-2005:867</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3193
https://nvd.nist.gov/vuln/detail/CVE-2005-3193
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3241">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617799" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617799" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors in the (1) ISAKMP, (2) FC-FCS, (3) RSVP, and (4) ISIS LSP dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3241
https://nvd.nist.gov/vuln/detail/CVE-2005-3241
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3242">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617800" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617800" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (crash) via unknown vectors in (1) the IrDA dissector and (2) the SMB dissector when SMB transaction payload reassembly is enabled.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3242
https://nvd.nist.gov/vuln/detail/CVE-2005-3242
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3243">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617801" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617801" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow remote attackers to execute arbitrary code via unknown vectors in the (1) SLIMP3 and (2) AgentX dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3243
https://nvd.nist.gov/vuln/detail/CVE-2005-3243
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3244">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617802" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617802" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3244
https://nvd.nist.gov/vuln/detail/CVE-2005-3244
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3245">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617803" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617803" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 to 0.10.12, when the &quot;Dissect unknown RPC program numbers&quot; option is enabled, allows remote attackers to cause a denial of service (memory consumption).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3245
https://nvd.nist.gov/vuln/detail/CVE-2005-3245
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3246">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617804" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617804" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (null dereference) via unknown vectors in the (1) SCSI, (2) sFlow, or (3) RTnet dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3246
https://nvd.nist.gov/vuln/detail/CVE-2005-3246
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3247">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617805" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617805" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3247
https://nvd.nist.gov/vuln/detail/CVE-2005-3247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3248">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617806" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617806" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-by-zero) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3248
https://nvd.nist.gov/vuln/detail/CVE-2005-3248
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3249">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-19T00:00:00</PublicDate>
    <Bugzilla id="1617807" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617807" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to 0.10.12 allows remote attackers to cause a denial of service or corrupt memory via unknown vectors that cause Ethereal to free an invalid pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:809">RHSA-2005:809</Advisory>
        <Package name="ethereal">ethereal-0:0.10.13-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3249
https://nvd.nist.gov/vuln/detail/CVE-2005-3249
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3257">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-15T00:00:00</PublicDate>
    <Bugzilla id="1617808" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617808" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3257
https://nvd.nist.gov/vuln/detail/CVE-2005-3257
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3258">
    <Details source="Mitre" xml:lang="en:us">
The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and earlier allows remote FTP servers to cause a denial of service (segmentation fault) via certain &quot;odd&quot; responses.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues do not affect the versions of Squid as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3258
https://nvd.nist.gov/vuln/detail/CVE-2005-3258
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3272">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-29T00:00:00</PublicDate>
    <Bugzilla id="1617809" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617809" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3272
https://nvd.nist.gov/vuln/detail/CVE-2005-3272
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3273">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-16T00:00:00</PublicDate>
    <Bugzilla id="1617810" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617810" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3273
https://nvd.nist.gov/vuln/detail/CVE-2005-3273
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3274">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-06-28T00:00:00</PublicDate>
    <Bugzilla id="1617811" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617811" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:663">RHSA-2005:663</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3274
https://nvd.nist.gov/vuln/detail/CVE-2005-3274
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3275">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-07-22T00:00:00</PublicDate>
    <Bugzilla id="1617812" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617812" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3275
https://nvd.nist.gov/vuln/detail/CVE-2005-3275
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3276">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-07-27T00:00:00</PublicDate>
    <Bugzilla id="1617813" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617813" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0144">RHSA-2006:0144</Advisory>
        <Package name="kernel">kernel-0:2.4.21-40.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3276
https://nvd.nist.gov/vuln/detail/CVE-2005-3276
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3313">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-23T00:00:00</PublicDate>
    <Bugzilla id="1617814" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617814" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers to cause a denial of service (infinite loop).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0156">RHSA-2006:0156</Advisory>
        <Package name="ethereal">ethereal-0:0.10.14-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3313
https://nvd.nist.gov/vuln/detail/CVE-2005-3313
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3319">
    <Details source="Mitre" xml:lang="en:us">
The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost.
    </Details>
    <Statement xml:lang="en:us">
We do not class this as a security issue as it only allows local users who have the privileges to create .htaccess files the ability to cause a denial of service. Untrusted users should never be given the ability to create .htaccess files.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3319
https://nvd.nist.gov/vuln/detail/CVE-2005-3319
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3350">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-11-03T00:00:00</PublicDate>
    <Bugzilla id="494823" url="https://bugzilla.redhat.com/show_bug.cgi?id=494823" xml:lang="en:us">
giflib/libunfig: memory corruption via a crafted GIF
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF file that leads to an out-of-bounds write.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:828">RHSA-2005:828</Advisory>
        <Package name="libungif">libungif-0:4.1.0-15.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:828">RHSA-2005:828</Advisory>
        <Package name="libungif">libungif-0:4.1.3-1.el4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-04-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0444">RHSA-2009:0444</Advisory>
        <Package name="giflib">giflib-0:4.1.3-7.1.el5_3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3350
https://nvd.nist.gov/vuln/detail/CVE-2005-3350
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3351">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-05T00:00:00</PublicDate>
    <Bugzilla id="1617815" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617815" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients (&quot;To&quot; addresses), which triggers a bus error in Perl.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0129">RHSA-2006:0129</Advisory>
        <Package name="spamassassin">spamassassin-0:3.0.5-3.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3351
https://nvd.nist.gov/vuln/detail/CVE-2005-3351
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3352">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-12T00:00:00</PublicDate>
    <Bugzilla id="430524" url="https://bugzilla.redhat.com/show_bug.cgi?id=430524" xml:lang="en:us">
httpd cross-site scripting flaw in mod_imap
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.46-56.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.52-22.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0158">RHSA-2006:0158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0158">RHSA-2006:0158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0158">RHSA-2006:0158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0158">RHSA-2006:0158</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0692">RHSA-2006:0692</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3352
https://nvd.nist.gov/vuln/detail/CVE-2005-3352
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3353">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-02T00:00:00</PublicDate>
    <Bugzilla id="1617816" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617816" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.2-26.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.9-3.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3353
https://nvd.nist.gov/vuln/detail/CVE-2005-3353
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3356">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-14T00:00:00</PublicDate>
    <Bugzilla id="1617817" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617817" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice (&quot;double decrement&quot;) as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3356
https://nvd.nist.gov/vuln/detail/CVE-2005-3356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3357">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-12-05T00:00:00</PublicDate>
    <Bugzilla id="1617818" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617818" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.46-56.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0159">RHSA-2006:0159</Advisory>
        <Package name="httpd">httpd-0:2.0.52-22.ent</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3357
https://nvd.nist.gov/vuln/detail/CVE-2005-3357
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3358">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-13T00:00:00</PublicDate>
    <Bugzilla id="1617819" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617819" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3358
https://nvd.nist.gov/vuln/detail/CVE-2005-3358
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3359">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-14T00:00:00</PublicDate>
    <Bugzilla id="1617820" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617820" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3359
https://nvd.nist.gov/vuln/detail/CVE-2005-3359
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3388">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-31T00:00:00</PublicDate>
    <Bugzilla id="1617821" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617821" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a &quot;stacked array assignment.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.2-26.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.9-3.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3388
https://nvd.nist.gov/vuln/detail/CVE-2005-3388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3389">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-31T00:00:00</PublicDate>
    <Bugzilla id="1617822" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617822" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.2-26.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.9-3.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3389
https://nvd.nist.gov/vuln/detail/CVE-2005-3389
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3390">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-10-31T00:00:00</PublicDate>
    <Bugzilla id="1617823" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617823" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a &quot;GLOBALS&quot; fileupload field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.2-26.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:831">RHSA-2005:831</Advisory>
        <Package name="php">php-0:4.3.9-3.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2005-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:838">RHSA-2005:838</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:stronghold:4">
        <ProductName>Red Hat Stronghold 4</ProductName>
        <ReleaseDate>2005-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:882">RHSA-2005:882</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3390
https://nvd.nist.gov/vuln/detail/CVE-2005-3390
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3391">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-31T00:00:00</PublicDate>
    <Bugzilla id="172204" url="https://bugzilla.redhat.com/show_bug.cgi?id=172204" xml:lang="en:us">
CVE-2005-3391 Two PHP safemode bypass issues (CVE-2005-3392)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3391
https://nvd.nist.gov/vuln/detail/CVE-2005-3391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3392">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3392
https://nvd.nist.gov/vuln/detail/CVE-2005-3392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3510">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-03T00:00:00</PublicDate>
    <Bugzilla id="237085" url="https://bugzilla.redhat.com/show_bug.cgi?id=237085" xml:lang="en:us">
tomcat DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0161">RHSA-2006:0161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3510
https://nvd.nist.gov/vuln/detail/CVE-2005-3510
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3573">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-12T00:00:00</PublicDate>
    <Bugzilla id="1617824" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617824" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Scrubber.py in Mailman 2.1.5-8 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service (application crash).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0204">RHSA-2006:0204</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-25.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0204">RHSA-2006:0204</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3573
https://nvd.nist.gov/vuln/detail/CVE-2005-3573
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3582">
    <Details source="Mitre" xml:lang="en:us">
ImageMagick before 6.2.4.2-r1 allows local users in the portage group to increase privileges via a shared object in the Portage temporary build directory, which is added to the search path allowing objects in it to be loaded at runtime.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue is caused by the way ImageMagick was packaged by Gentoo and does not affect Red Hat Enterprise Linux packages.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3582
https://nvd.nist.gov/vuln/detail/CVE-2005-3582
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3590">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2019-04-10T00:00:00</PublicDate>
    <Bugzilla id="1706046" url="https://bugzilla.redhat.com/show_bug.cgi?id=1706046" xml:lang="en:us">
glibc: buffer overflow in getgrouplist function leading to corrupted memory
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.6</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-120</CWE>
    <Details source="Mitre" xml:lang="en:us">
The getgrouplist function in the GNU C library (glibc) before version 2.3.5, when invoked with a zero argument, writes to the passed pointer even if the specified array size is zero, leading to a buffer overflow and potentially allowing attackers to corrupt memory.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3590
https://nvd.nist.gov/vuln/detail/CVE-2005-3590
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3623">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-20T00:00:00</PublicDate>
    <Bugzilla id="1617825" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617825" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3623
https://nvd.nist.gov/vuln/detail/CVE-2005-3623
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3624">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-03T00:00:00</PublicDate>
    <Bugzilla id="1617826" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617826" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.36</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0177">RHSA-2006:0177</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3624
https://nvd.nist.gov/vuln/detail/CVE-2005-3624
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3625">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-03T00:00:00</PublicDate>
    <Bugzilla id="1617827" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617827" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka &quot;Infinite CPU spins.&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.36</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0177">RHSA-2006:0177</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3625
https://nvd.nist.gov/vuln/detail/CVE-2005-3625
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3626">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-03T00:00:00</PublicDate>
    <Bugzilla id="1617828" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617828" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.36</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0177">RHSA-2006:0177</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3626
https://nvd.nist.gov/vuln/detail/CVE-2005-3626
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3627">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-03T00:00:00</PublicDate>
    <Bugzilla id="1617829" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617829" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via a DCTDecode stream with (1) a large &quot;number of components&quot; value that is not checked by DCTStream::readBaselineSOF or DCTStream::readProgressiveSOF, (2) a large &quot;Huffman table index&quot; value that is not checked by DCTStream::readHuffmanTables, and (3) certain uses of the scanInfo.numComps value by DCTStream::readScanInfo.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.36</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0163">RHSA-2006:0163</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0177">RHSA-2006:0177</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3627
https://nvd.nist.gov/vuln/detail/CVE-2005-3627
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3628">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-06T00:00:00</PublicDate>
    <Bugzilla id="1617830" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617830" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Dirk Mueller for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:2.02-9.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.34</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:840">RHSA-2005:840</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:867">RHSA-2005:867</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:868">RHSA-2005:868</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:878">RHSA-2005:878</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0160">RHSA-2006:0160</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.EL4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3628
https://nvd.nist.gov/vuln/detail/CVE-2005-3628
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3629">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-03-07T00:00:00</PublicDate>
    <Bugzilla id="1617831" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617831" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0015">RHSA-2006:0015</Advisory>
        <Package name="initscripts">initscripts-0:7.31.30.EL-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0016">RHSA-2006:0016</Advisory>
        <Package name="initscripts">initscripts-0:7.93.24.EL-1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3629
https://nvd.nist.gov/vuln/detail/CVE-2005-3629
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3631">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-20T00:00:00</PublicDate>
    <Bugzilla id="1617832" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617832" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
udev does not properly set permissions on certain files in /dev/input, which allows local users to obtain sensitive data that is entered at the console, such as user passwords.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:864">RHSA-2005:864</Advisory>
        <Package name="udev">udev-0:039-10.10.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3631
https://nvd.nist.gov/vuln/detail/CVE-2005-3631
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3632">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617833" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617833" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:843">RHSA-2005:843</Advisory>
        <Package name="netpbm">netpbm-0:9.24-11.30.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3632
https://nvd.nist.gov/vuln/detail/CVE-2005-3632
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3651">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-09T21:45:00</PublicDate>
    <Bugzilla id="1617834" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617834" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0156">RHSA-2006:0156</Advisory>
        <Package name="ethereal">ethereal-0:0.10.14-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3651
https://nvd.nist.gov/vuln/detail/CVE-2005-3651
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3656">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-01-09T22:16:00</PublicDate>
    <Bugzilla id="1617835" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617835" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in logging functions in mod_auth_pgsql before 2.0.3, when used for user authentication against a PostgreSQL database, allows remote unauthenticated attackers to execute arbitrary code, as demonstrated via the username.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0164">RHSA-2006:0164</Advisory>
        <Package name="mod_auth_pgsql">mod_auth_pgsql-0:2.0.1-4.ent.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0164">RHSA-2006:0164</Advisory>
        <Package name="mod_auth_pgsql">mod_auth_pgsql-0:2.0.1-7.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3656
https://nvd.nist.gov/vuln/detail/CVE-2005-3656
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3662">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-12T00:00:00</PublicDate>
    <Bugzilla id="1617836" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617836" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:843">RHSA-2005:843</Advisory>
        <Package name="netpbm">netpbm-0:9.24-11.30.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3662
https://nvd.nist.gov/vuln/detail/CVE-2005-3662
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3732">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-20T00:00:00</PublicDate>
    <Bugzilla id="1617837" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617837" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0267">RHSA-2006:0267</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.2.5-0.7.rhel3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0267">RHSA-2006:0267</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.3.3-6.rhel4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3732
https://nvd.nist.gov/vuln/detail/CVE-2005-3732
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3745">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-21T00:00:00</PublicDate>
    <Bugzilla id="1617838" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617838" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>Red Hat Application Server 3AS</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0157">RHSA-2006:0157</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0161">RHSA-2006:0161</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3745
https://nvd.nist.gov/vuln/detail/CVE-2005-3745
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3784">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-11-10T00:00:00</PublicDate>
    <Bugzilla id="1617839" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617839" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3784
https://nvd.nist.gov/vuln/detail/CVE-2005-3784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3806">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-10-25T00:00:00</PublicDate>
    <Bugzilla id="1617840" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617840" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0191">RHSA-2006:0191</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0190">RHSA-2006:0190</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3806
https://nvd.nist.gov/vuln/detail/CVE-2005-3806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3848">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-18T00:00:00</PublicDate>
    <Bugzilla id="1617841" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617841" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka &quot;DST leak in icmp_push_reply.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3848
https://nvd.nist.gov/vuln/detail/CVE-2005-3848
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3857">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-13T00:00:00</PublicDate>
    <Bugzilla id="1617842" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617842" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3857
https://nvd.nist.gov/vuln/detail/CVE-2005-3857
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3858">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-26T00:00:00</PublicDate>
    <Bugzilla id="1617843" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617843" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0140">RHSA-2006:0140</Advisory>
        <Package name="kernel">kernel-0:2.4.21-37.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3858
https://nvd.nist.gov/vuln/detail/CVE-2005-3858
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3883">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-11-24T00:00:00</PublicDate>
    <Bugzilla id="1617845" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617845" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the &quot;To&quot; address argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3883
https://nvd.nist.gov/vuln/detail/CVE-2005-3883
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3962">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-01T00:00:00</PublicDate>
    <Bugzilla id="1617848" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617848" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:881">RHSA-2005:881</Advisory>
        <Package name="perl">perl-2:5.8.0-90.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:880">RHSA-2005:880</Advisory>
        <Package name="perl">perl-3:5.8.5-24.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3962
https://nvd.nist.gov/vuln/detail/CVE-2005-3962
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-3964">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-02T00:00:00</PublicDate>
    <Bugzilla id="430519" url="https://bugzilla.redhat.com/show_bug.cgi?id=430519" xml:lang="en:us">
openmotif libUil buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in libUil (libUil.so) in OpenMotif 2.2.3, and possibly other versions, allows attackers to execute arbitrary code via the (1) diag_issue_diagnostic function in UilDiags.c and (2) open_source_file function in UilSrcSrc.c.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0272">RHSA-2006:0272</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-5.RHEL3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0272">RHSA-2006:0272</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0272">RHSA-2006:0272</Advisory>
        <Package name="openmotif">openmotif-0:2.2.3-10.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0272">RHSA-2006:0272</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-3964
https://nvd.nist.gov/vuln/detail/CVE-2005-3964
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4077">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-07T00:00:00</PublicDate>
    <Bugzilla id="1617850" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617850" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a &quot;?&quot;  separator in the hostname portion, which causes a &quot;/&quot; to be prepended to the resulting string.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-12-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:875">RHSA-2005:875</Advisory>
        <Package name="curl">curl-0:7.12.1-8.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4077
https://nvd.nist.gov/vuln/detail/CVE-2005-4077
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4134">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-03T00:00:00</PublicDate>
    <Bugzilla id="1617852" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617852" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5, Netscape 8.0.4 and 7.2, and K-Meleon before 0.9.12 allows remote attackers to cause a denial of service (CPU consumption and delayed application startup) via a web site with a large title, which is recorded in history.dat but not processed efficiently during startup.  NOTE: despite initial reports, the Mozilla vendor does not believe that this issue can be used to trigger a crash or buffer overflow in Firefox.  Also, it has been independently reported that Netscape 8.1 does not have this issue.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0200">RHSA-2006:0200</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4134
https://nvd.nist.gov/vuln/detail/CVE-2005-4134
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4153">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-01T00:00:00</PublicDate>
    <Bugzilla id="1617854" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617854" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to &quot;fail with an Overflow on bad date data in a processed message,&quot; a different vulnerability than CVE-2005-3573.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0204">RHSA-2006:0204</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-25.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0204">RHSA-2006:0204</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4153
https://nvd.nist.gov/vuln/detail/CVE-2005-4153
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4158">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-11T00:00:00</PublicDate>
    <Bugzilla id="139478" url="https://bugzilla.redhat.com/show_bug.cgi?id=139478" xml:lang="en:us">
CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue.
https://bugzilla.redhat.com/show_bug.cgi?id=139478#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4158
https://nvd.nist.gov/vuln/detail/CVE-2005-4158
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4268">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-07T00:00:00</PublicDate>
    <Bugzilla id="229191" url="https://bugzilla.redhat.com/show_bug.cgi?id=229191" xml:lang="en:us">
cpio large filesize buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2010-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0145">RHSA-2010:0145</Advisory>
        <Package name="cpio">cpio-0:2.5-6.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0245">RHSA-2007:0245</Advisory>
        <Package name="cpio">cpio-0:2.5-13.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4268
https://nvd.nist.gov/vuln/detail/CVE-2005-4268
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4348">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-12-19T00:00:00</PublicDate>
    <Bugzilla id="1617856" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617856" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team has rated this issue as having low security impact.  An update is available for Red Hat Enterprise Linux 4 to correct this issue:
http://rhn.redhat.com/errata/RHSA-2007-0018.html

This issue did not affect Red Hat Enterprise Linux 2.1 and 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:5.9.0-21.7.3.el2.1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.0-3.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.5-6.el4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4348
https://nvd.nist.gov/vuln/detail/CVE-2005-4348
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4442">
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in OpenLDAP before 2.2.28-r3 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of OpenLDAP as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4442
https://nvd.nist.gov/vuln/detail/CVE-2005-4442
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4585">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-12-27T00:00:00</PublicDate>
    <Bugzilla id="1617858" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617858" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0156">RHSA-2006:0156</Advisory>
        <Package name="ethereal">ethereal-0:0.10.14-1.EL3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4585
https://nvd.nist.gov/vuln/detail/CVE-2005-4585
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4601">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-12-29T00:00:00</PublicDate>
    <Bugzilla id="1617859" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617859" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The delegate code in ImageMagick 6.2.4.5-0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a filename that is processed by the display command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0178">RHSA-2006:0178</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0178">RHSA-2006:0178</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4601
https://nvd.nist.gov/vuln/detail/CVE-2005-4601
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4605">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-12-23T00:00:00</PublicDate>
    <Bugzilla id="1617860" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617860" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0101">RHSA-2006:0101</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4605
https://nvd.nist.gov/vuln/detail/CVE-2005-4605
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4636">
    <Details source="Mitre" xml:lang="en:us">
OpenOffice.org 2.0 and earlier, when hyperlinks has been disabled, does not prevent the user from clicking the WWW-browser button in the Hyperlink dialog, which makes it easier for attackers to trick the user into bypassing intended security settings.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of OpenOffice.org as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4636
https://nvd.nist.gov/vuln/detail/CVE-2005-4636
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4667">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-12-19T00:00:00</PublicDate>
    <Bugzilla id="1617861" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617861" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename command line argument.  NOTE: since the overflow occurs in a non-setuid program, there are not many scenarios under which it poses a vulnerability, unless unzip is passed long arguments when it is invoked from other programs.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178960

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-11T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0418">RHBA-2007:0418</Advisory>
        <Package name="unzip">unzip-0:5.50-35.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0203">RHSA-2007:0203</Advisory>
        <Package name="unzip">unzip-0:5.51-9.EL4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4667
https://nvd.nist.gov/vuln/detail/CVE-2005-4667
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4744">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-09-09T00:00:00</PublicDate>
    <Bugzilla id="1617862" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617862" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the sql_error function in sql_unixodbc.c in FreeRADIUS 1.0.2.5-5, and possibly other versions including 1.0.4, might allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the external database query to fail.  NOTE: this single issue is part of a larger-scale disclosure, originally by SUSE, which reported multiple issues that were disputed by FreeRADIUS.  Disputed issues included file descriptor leaks, memory disclosure, LDAP injection, and other issues.  Without additional information, the most recent FreeRADIUS report is being regarded as the authoritative source for this CVE identifier.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0271">RHSA-2006:0271</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-2.RHEL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0271">RHSA-2006:0271</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-3.RHEL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4744
https://nvd.nist.gov/vuln/detail/CVE-2005-4744
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4745">
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in the rlm_sqlcounter module in FreeRADIUS 1.0.3 and 1.0.4 allows remote attackers to execute arbitrary SQL commands via unknown attack vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the FreeRADIUS packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4745
https://nvd.nist.gov/vuln/detail/CVE-2005-4745
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4746">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in FreeRADIUS 1.0.3 and 1.0.4 allow remote attackers to cause denial of service (crash) via (1) the rlm_sqlcounter module or (2) unknown vectors &quot;while expanding %t&quot;.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect the FreeRADIUS packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4746
https://nvd.nist.gov/vuln/detail/CVE-2005-4746
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4784">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the POSIX readdir_r function, as used in multiple packages, allow local users to cause a denial of service and possibly execute arbitrary code via (1) a symlink attack that exploits a race condition between opendir and pathcon calls and changes the filesystem to one with a larger maximum directory-entry name length, or (2) possibly via programmer-introduced errors on operating systems with a small struct dirent, such as Solaris or BeOS, as demonstrated in packages including (a) gcj, (b) KDE, (c) libwww, (d) the Rudiments library, (e) teTeX, (f) xmail, (g) bfbtester, (h) ncftp, (i) netwib, (j) OpenOffice.org, (k) Pike, (l) reprepro, (m) Tcl, and (n) xgsmlib.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the Linux glibc.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4784
https://nvd.nist.gov/vuln/detail/CVE-2005-4784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4790">
    <Bugzilla id="252294" url="https://bugzilla.redhat.com/show_bug.cgi?id=252294" xml:lang="en:us">
tomboy and blam uses insecure LD_LIBRARY_PATH
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam.  NOTE: in August 2007, the tomboy vector was reported for other distributions.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4790
https://nvd.nist.gov/vuln/detail/CVE-2005-4790
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4791">
    <Bugzilla id="393281" url="https://bugzilla.redhat.com/show_bug.cgi?id=393281" xml:lang="en:us">
liferea uses insecure LD_LIBRARY_PATH
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4791
https://nvd.nist.gov/vuln/detail/CVE-2005-4791
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4798">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-25T00:00:00</PublicDate>
    <Bugzilla id="1617863" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617863" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0144">RHSA-2006:0144</Advisory>
        <Package name="kernel">kernel-0:2.4.21-40.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4798
https://nvd.nist.gov/vuln/detail/CVE-2005-4798
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4807">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code.
    </Details>
    <Statement xml:lang="en:us">
gas (and gcc) make no promise that they are fault tolerant to bad input.  We do not plan on producing security updates for Red Hat Enterprise Linux to correct these bugs.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4807
https://nvd.nist.gov/vuln/detail/CVE-2005-4807
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4808">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in reset_vars in config/tc-crx.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050714 allows user-assisted attackers to have an unknown impact via a crafted .s file.
    </Details>
    <Statement xml:lang="en:us">
gas (and gcc) make no promise that they are fault tolerant to bad input.  We do not plan on producing security updates for Red Hat Enterprise Linux to correct these bugs.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4808
https://nvd.nist.gov/vuln/detail/CVE-2005-4808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4811">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-05T00:00:00</PublicDate>
    <Bugzilla id="1617864" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617864" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4811
https://nvd.nist.gov/vuln/detail/CVE-2005-4811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4835">
    <Details source="Mitre" xml:lang="en:us">
The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4835
https://nvd.nist.gov/vuln/detail/CVE-2005-4835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4837">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-23T00:00:00</PublicDate>
    <Bugzilla id="1617865" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617865" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2005-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:373">RHSA-2005:373</Advisory>
        <Package name="net-snmp">net-snmp-0:5.0.9-2.30E.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:395">RHSA-2005:395</Advisory>
        <Package name="net-snmp">net-snmp-0:5.1.2-11.EL4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4837
https://nvd.nist.gov/vuln/detail/CVE-2005-4837
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4838">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-01-03T00:00:00</PublicDate>
    <Bugzilla id="238401" url="https://bugzilla.redhat.com/show_bug.cgi?id=238401" xml:lang="en:us">
tomcat manager example DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in the example web applications for Jakarta Tomcat 5.5.6 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) el/functions.jsp, (2) el/implicit-objects.jsp, and (3) jspx/textRotate.jspx in examples/jsp2/, as demonstrated via script in a request to snp/snoop.jsp.  NOTE: other XSS issues in the manager were simultaneously reported, but these require admin access and do not cross privilege boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4838
https://nvd.nist.gov/vuln/detail/CVE-2005-4838
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4872">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="383361" url="https://bugzilla.redhat.com/show_bug.cgi?id=383361" xml:lang="en:us">
pcre incorrect memory requirement computation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 6.2 does not properly count the number of named capturing subpatterns, which allows context-dependent attackers to cause a denial of service (crash) via a regular expression with a large number of named subpatterns, which triggers a buffer overflow.  NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1052">RHSA-2007:1052</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_5.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1052">RHSA-2007:1052</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4872
https://nvd.nist.gov/vuln/detail/CVE-2005-4872
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4881">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-28T00:00:00</PublicDate>
    <Bugzilla id="521601" url="https://bugzilla.redhat.com/show_bug.cgi?id=521601" xml:lang="en:us">
kernel: netlink: fix numerous padding memleaks
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.1</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
    </Details>
    <Statement xml:lang="en:us">
This issue has been rated as having moderate security impact. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, and Red Hat Enterprise MRG. It affects Red Hat Enterprise Linux 3, and 4.

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important and critical impact are addressed.

For further information about Errata Support Policy, visit: https://access.redhat.com/support/policy/updates/errata/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1522">RHSA-2009:1522</Advisory>
        <Package name="kernel">kernel-0:2.6.9-89.0.15.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4881
https://nvd.nist.gov/vuln/detail/CVE-2005-4881
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4886">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-04-24T00:00:00</PublicDate>
    <Bugzilla id="160117" url="https://bugzilla.redhat.com/show_bug.cgi?id=160117" xml:lang="en:us">
Fix ipv6 exthdr bug causing Oops
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>7.8</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:L/Au:N/C:N/I:N/A:C</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4886
https://nvd.nist.gov/vuln/detail/CVE-2005-4886
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4889">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2010-06-01T00:00:00</PublicDate>
    <Bugzilla id="625756" url="https://bugzilla.redhat.com/show_bug.cgi?id=625756" xml:lang="en:us">
rpm: fails to drop SUID/SGID bits on package removal
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>1.9</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
lib/fsm.c in RPM before 4.4.3 does not properly reset the metadata of an executable file during deletion of the file in an RPM package removal, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file, a related issue to CVE-2010-2059.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2010-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0678">RHSA-2010:0678</Advisory>
        <Package name="rpm">rpm-0:4.3.3-33_nonptl.el4_8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4889
https://nvd.nist.gov/vuln/detail/CVE-2005-4889
    </References>
</Vulnerability>

<Vulnerability name="CVE-2005-4890">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2004-07-26T00:00:00</PublicDate>
    <Bugzilla id="710208" url="https://bugzilla.redhat.com/show_bug.cgi?id=710208" xml:lang="en:us">
coreutils: tty hijacking possible in &quot;su&quot; via TIOCSTI ioctl
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>6.2</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:H/Au:N/C:C/I:C/A:C</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via &quot;su - user -c program&quot;. The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
    </Details>
    <Statement xml:lang="en:us">
This issue affects the version of coreutils package, as shipped with Red Hat Enterprise Linux 4. Red Hat Enterprise Linux 4 is however in the Extended Life Cycle Support (ELS) phase. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>coreutils</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>coreutils</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>coreutils</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2005-4890
https://nvd.nist.gov/vuln/detail/CVE-2005-4890
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0019">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-01-19T17:00:00</PublicDate>
    <Bugzilla id="1617866" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617866" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0184">RHSA-2006:0184</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-3.14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0019
https://nvd.nist.gov/vuln/detail/CVE-2006-0019
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0024">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-03-14T00:00:00</PublicDate>
    <Bugzilla id="1617867" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617867" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0268">RHSA-2006:0268</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0268">RHSA-2006:0268</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0024
https://nvd.nist.gov/vuln/detail/CVE-2006-0024
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0038">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-03-21T00:00:00</PublicDate>
    <Bugzilla id="1617868" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617868" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using &quot;virtualization solutions&quot; such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0038
https://nvd.nist.gov/vuln/detail/CVE-2006-0038
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0039">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-05-16T00:00:00</PublicDate>
    <Bugzilla id="1617869" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617869" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Solar Designer for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0039
https://nvd.nist.gov/vuln/detail/CVE-2006-0039
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0040">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-01T00:00:00</PublicDate>
    <Bugzilla id="183680" url="https://bugzilla.redhat.com/show_bug.cgi?id=183680" xml:lang="en:us">
DoS from large email
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNOME Evolution 2.4.2.1 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a text e-mail with a large number of URLs, possibly due to unknown problems in gtkhtml.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>evolution</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>evolution</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0040
https://nvd.nist.gov/vuln/detail/CVE-2006-0040
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0043">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0043
https://nvd.nist.gov/vuln/detail/CVE-2006-0043
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0049">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-09T00:00:00</PublicDate>
    <Bugzilla id="1617870" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617870" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0266">RHSA-2006:0266</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0266">RHSA-2006:0266</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0049
https://nvd.nist.gov/vuln/detail/CVE-2006-0049
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0052">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-06T00:00:00</PublicDate>
    <Bugzilla id="1617871" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617871" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0486">RHSA-2006:0486</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-25.rhel3.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0486">RHSA-2006:0486</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0052
https://nvd.nist.gov/vuln/detail/CVE-2006-0052
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0058">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-03-22T16:00:00</PublicDate>
    <Bugzilla id="1617872" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617872" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0264">RHSA-2006:0264</Advisory>
        <Package name="sendmail">sendmail-0:8.12.11-4.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0264">RHSA-2006:0264</Advisory>
        <Package name="sendmail">sendmail-0:8.13.1-3.RHEL4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0265">RHSA-2006:0265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0265">RHSA-2006:0265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0265">RHSA-2006:0265</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0265">RHSA-2006:0265</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0058
https://nvd.nist.gov/vuln/detail/CVE-2006-0058
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0082">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617873" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617873" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the SetImageInfo function in image.c for ImageMagick 6.2.3 and other versions, and GraphicsMagick, allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a numeric format string specifier such as %d in the file name, a variant of CVE-2005-0397, and as demonstrated using the convert program.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0178">RHSA-2006:0178</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0178">RHSA-2006:0178</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0082
https://nvd.nist.gov/vuln/detail/CVE-2006-0082
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0095">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-01-04T00:00:00</PublicDate>
    <Bugzilla id="1617874" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617874" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0132">RHSA-2006:0132</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0095
https://nvd.nist.gov/vuln/detail/CVE-2006-0095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0097">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the create_named_pipe function in libmysql.c in PHP 4.3.10 and 4.4.x before 4.4.3 for Windows allows attackers to execute arbitrary code via a long (1) arg_host or (2) arg_unix_socket argument, as demonstrated by a long named pipe variable in the host argument to the mysql_connect function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0097
https://nvd.nist.gov/vuln/detail/CVE-2006-0097
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0150">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-01-09T18:36:00</PublicDate>
    <Bugzilla id="1617875" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617875" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0179">RHSA-2006:0179</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0179">RHSA-2006:0179</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0179">RHSA-2006:0179</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0179">RHSA-2006:0179</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0150
https://nvd.nist.gov/vuln/detail/CVE-2006-0150
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0151">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-11-11T00:00:00</PublicDate>
    <Bugzilla id="139478" url="https://bugzilla.redhat.com/show_bug.cgi?id=139478" xml:lang="en:us">
CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue.
https://bugzilla.redhat.com/show_bug.cgi?id=139478#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0151
https://nvd.nist.gov/vuln/detail/CVE-2006-0151
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0188">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-01T00:00:00</PublicDate>
    <Bugzilla id="1617876" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617876" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter.  NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0188
https://nvd.nist.gov/vuln/detail/CVE-2006-0188
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0195">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-10T00:00:00</PublicDate>
    <Bugzilla id="1617877" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617877" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) &quot;/*&quot; and &quot;*/&quot; comments, or (2) a newline in a &quot;url&quot; specifier, which is processed by certain web browsers including Internet Explorer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0195
https://nvd.nist.gov/vuln/detail/CVE-2006-0195
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0208">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-01-12T00:00:00</PublicDate>
    <Bugzilla id="1617878" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617878" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0208
https://nvd.nist.gov/vuln/detail/CVE-2006-0208
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0225">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-09-28T00:00:00</PublicDate>
    <Bugzilla id="168167" url="https://bugzilla.redhat.com/show_bug.cgi?id=168167" xml:lang="en:us">
local to local copy uses shell expansion twice
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
    </Details>
    <Statement xml:lang="en:us">
Issue was fixed upstream in version 4.3. The openssh packages in Red Hat Enterprise Linux 5 are based on the fixed upstream version and were not affected by this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0698">RHSA-2006:0698</Advisory>
        <Package name="openssh">openssh-0:3.1p1-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0298">RHSA-2006:0298</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0044">RHSA-2006:0044</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0225
https://nvd.nist.gov/vuln/detail/CVE-2006-0225
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0236">
    <Details source="Mitre" xml:lang="en:us">
GUI display truncation vulnerability in Mozilla Thunderbird 1.0.2, 1.0.6, and 1.0.7 allows user-assisted attackers to execute arbitrary code via an attachment with a filename containing a large number of spaces ending with a dangerous extension that is not displayed by Thunderbird, along with an inconsistent Content-Type header, which could be used to trick a user into downloading dangerous content by dragging or saving the attachment.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  We verified that this issue does not affect Linux versions of Thunderbird.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0236
https://nvd.nist.gov/vuln/detail/CVE-2006-0236
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0254">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-01-15T00:00:00</PublicDate>
    <Bugzilla id="430646" url="https://bugzilla.redhat.com/show_bug.cgi?id=430646" xml:lang="en:us">
tomcat examples XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>Red Hat Application Server 3AS</ProductName>
        <ReleaseDate>2006-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0592">RHSA-2006:0592</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-03-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0161">RHSA-2006:0161</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0254
https://nvd.nist.gov/vuln/detail/CVE-2006-0254
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0292">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-02-02T00:00:00</PublicDate>
    <Bugzilla id="1617879" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617879" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Javascript interpreter (jsinterp.c) in Mozilla and Firefox before 1.5.1 does not properly dereference objects, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via unknown attack vectors related to garbage collection.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0200">RHSA-2006:0200</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0292
https://nvd.nist.gov/vuln/detail/CVE-2006-0292
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0296">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-02T00:00:00</PublicDate>
    <Bugzilla id="1617880" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617880" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1, and SeaMonkey before 1.0 does not validate the attribute name, which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0200">RHSA-2006:0200</Advisory>
        <Package name="firefox">firefox-0:1.0.7-1.4.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0296
https://nvd.nist.gov/vuln/detail/CVE-2006-0296
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0300">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-17T00:00:00</PublicDate>
    <Bugzilla id="1617881" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617881" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in tar 1.14 through 1.15.90 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute code via unspecified vectors involving PAX extended headers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0232">RHSA-2006:0232</Advisory>
        <Package name="tar">tar-0:1.14-9.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0300
https://nvd.nist.gov/vuln/detail/CVE-2006-0300
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0301">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-05T00:00:00</PublicDate>
    <Bugzilla id="1617882" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617882" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Dirk Mueller for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0201">RHSA-2006:0201</Advisory>
        <Package name="xpdf">xpdf-1:3.00-11.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0206">RHSA-2006:0206</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0301
https://nvd.nist.gov/vuln/detail/CVE-2006-0301
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0321">
    <Details source="Mitre" xml:lang="en:us">
fetchmail 6.3.0 and other versions before 6.3.2 allows remote attackers to cause a denial of service (crash) via crafted e-mail messages that cause a free of an invalid pointer when fetchmail bounces the message to the originator or local postmaster.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of Fetchmail as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0321
https://nvd.nist.gov/vuln/detail/CVE-2006-0321
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0323">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-03-22T20:00:00</PublicDate>
    <Bugzilla id="1617883" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617883" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a size value that is less than the actual size, or (2) other unspecified manipulations.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0257">RHSA-2006:0257</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0257">RHSA-2006:0257</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0323
https://nvd.nist.gov/vuln/detail/CVE-2006-0323
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0377">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-15T00:00:00</PublicDate>
    <Bugzilla id="1617884" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617884" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command, aka &quot;IMAP injection.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0283">RHSA-2006:0283</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-5.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0377
https://nvd.nist.gov/vuln/detail/CVE-2006-0377
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0405">
    <Details source="Mitre" xml:lang="en:us">
The TIFFFetchShortPair function in tif_dirread.c in libtiff 3.8.0 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF image that triggers a NULL pointer dereference, possibly due to changes in type declarations and/or the TIFFVSetField function.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of libtiff as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0405
https://nvd.nist.gov/vuln/detail/CVE-2006-0405
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0451">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-13T00:00:00</PublicDate>
    <Bugzilla id="179135" url="https://bugzilla.redhat.com/show_bug.cgi?id=179135" xml:lang="en:us">
memory leaks using ber_scanf when handling bad BER packets (CVE-2006-0453)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple memory leaks in the LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (memory consumption) via invalid BER packets that trigger an error, which might prevent memory from being freed if it was allocated during the ber_scanf call, as demonstrated using the ProtoVer LDAP test suite.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:directory_server:7.1">
        <ProductName>RHEL 4 Directory Server AS</ProductName>
        <ReleaseDate>2006-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0270">RHSA-2006:0270</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0451
https://nvd.nist.gov/vuln/detail/CVE-2006-0451
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0452">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-12-23T00:00:00</PublicDate>
    <Bugzilla id="179137" url="https://bugzilla.redhat.com/show_bug.cgi?id=179137" xml:lang="en:us">
recursion causes OOM with bad DN in dn2ancestor
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
dn2ancestor in the LDAP component in Fedora Directory Server 1.0 allows remote attackers to cause a denial of service (CPU and memory consumption) via a ModDN operation with a DN that contains a large number of &quot;,&quot; (comma) characters, which results in a large amount of recursion, as demonstrated using the ProtoVer LDAP test suite.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:directory_server:7.1">
        <ProductName>RHEL 4 Directory Server AS</ProductName>
        <ReleaseDate>2006-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0270">RHSA-2006:0270</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0452
https://nvd.nist.gov/vuln/detail/CVE-2006-0452
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0453">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-02-14T00:00:00</PublicDate>
    <Bugzilla id="1617999" url="https://bugzilla.redhat.com/show_bug.cgi?id=1617999" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (crash) via a certain &quot;bad BER sequence&quot; that results in a free of uninitialized memory, as demonstrated using the ProtoVer LDAP test suite.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:directory_server:7.1">
        <ProductName>RHEL 4 Directory Server AS</ProductName>
        <ReleaseDate>2006-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0270">RHSA-2006:0270</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0453
https://nvd.nist.gov/vuln/detail/CVE-2006-0453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0454">
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This vulnerability was introduced into the Linux kernel in version 2.6.12 and therefore does not affect users of Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0454
https://nvd.nist.gov/vuln/detail/CVE-2006-0454
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0455">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-15T00:00:00</PublicDate>
    <Bugzilla id="1618000" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618000" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded.  Note: this also occurs when running the equivalent command &quot;gpg --verify&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0266">RHSA-2006:0266</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0266">RHSA-2006:0266</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0455
https://nvd.nist.gov/vuln/detail/CVE-2006-0455
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0456">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-07T00:00:00</PublicDate>
    <Bugzilla id="1618001" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618001" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0456
https://nvd.nist.gov/vuln/detail/CVE-2006-0456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0457">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-03T00:00:00</PublicDate>
    <Bugzilla id="1618002" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618002" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0457
https://nvd.nist.gov/vuln/detail/CVE-2006-0457
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0459">
    <Details source="Mitre" xml:lang="en:us">
flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.
    </Details>
    <Statement xml:lang="en:us">
This issue only affects parsers which are generated by grammars which either use REJECT or rules with a variable trailing context (in these rules the parser has to keep all backtracking paths).  The Red Hat Security Response Team analysed all packages that include flex generated parsers in Red Hat Enterprise Linux (2.1, 3, and 4) and found none were vulnerable.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0459
https://nvd.nist.gov/vuln/detail/CVE-2006-0459
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0481">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2004-12-03T00:00:00</PublicDate>
    <Bugzilla id="1618003" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618003" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the alpha strip capability in libpng 1.2.7 allows context-dependent attackers to cause a denial of service (crash) when the png_do_strip_filler function is used to strip alpha channels out of the image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0205">RHSA-2006:0205</Advisory>
        <Package name="libpng">libpng-2:1.2.7-1.el4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0481
https://nvd.nist.gov/vuln/detail/CVE-2006-0481
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0553">
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.1.0 through 8.1.2 allows authenticated database users to gain additional privileges via &quot;knowledge of the backend protocol&quot; using a crafted SET ROLE to other database users, a different vulnerability than CVE-2006-0678.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of PostgreSQL as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0553
https://nvd.nist.gov/vuln/detail/CVE-2006-0553
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0555">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-27T00:00:00</PublicDate>
    <Bugzilla id="181795" url="https://bugzilla.redhat.com/show_bug.cgi?id=181795" xml:lang="en:us">
NFS client panic using O_DIRECT
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0555
https://nvd.nist.gov/vuln/detail/CVE-2006-0555
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0557">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-17T00:00:00</PublicDate>
    <Bugzilla id="1618010" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618010" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0557
https://nvd.nist.gov/vuln/detail/CVE-2006-0557
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0558">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-01T00:00:00</PublicDate>
    <Bugzilla id="250199" url="https://bugzilla.redhat.com/show_bug.cgi?id=250199" xml:lang="en:us">
ia64 crash
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0774">RHSA-2007:0774</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.6.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0558
https://nvd.nist.gov/vuln/detail/CVE-2006-0558
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0576">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-07T00:00:00</PublicDate>
    <Bugzilla id="1618011" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618011" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in opcontrol in OProfile 0.9.1 and earlier allows local users to execute arbitrary commands via a modified PATH that references malicious (1) which or (2) dirname programs.  NOTE: while opcontrol normally is not run setuid, a common configuration suggests accessing opcontrol using sudo.  In such a context, this is a vulnerability.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 3
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207347

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

This issue was fixed for Red Hat Enterprise Linux 4 in the following errata:
http://rhn.redhat.com/errata/RHEA-2006-0355.html

This issue does not affect Red Hat Enterprise Linux 2
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux AS version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2006:0355">RHEA-2006:0355</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux Desktop version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2006:0355">RHEA-2006:0355</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux ES version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2006:0355">RHEA-2006:0355</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux WS version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2006:0355">RHEA-2006:0355</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0576
https://nvd.nist.gov/vuln/detail/CVE-2006-0576
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0591">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-07T00:00:00</PublicDate>
    <Bugzilla id="1618012" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618012" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The crypt_gensalt functions for BSDI-style extended DES-based and FreeBSD-sytle MD5-based password hashes in crypt_blowfish 0.4.7 and earlier do not evenly and randomly distribute salts, which makes it easier for attackers to guess passwords from a stolen password file due to the increased number of collisions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.15-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="postgresql">postgresql-0:7.4.13-2.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0591
https://nvd.nist.gov/vuln/detail/CVE-2006-0591
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0645">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-09T15:38:00</PublicDate>
    <Bugzilla id="184097" url="https://bugzilla.redhat.com/show_bug.cgi?id=184097" xml:lang="en:us">
- libtasn1 buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via &quot;out-of-bounds access&quot; caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-02-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0207">RHSA-2006:0207</Advisory>
        <Package name="gnutls">gnutls-0:1.0.20-3.2.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0645
https://nvd.nist.gov/vuln/detail/CVE-2006-0645
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0670">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-05T00:00:00</PublicDate>
    <Bugzilla id="187945" url="https://bugzilla.redhat.com/show_bug.cgi?id=187945" xml:lang="en:us">
bluez-hcidump Denial of Service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in l2cap.c in hcidump 1.29 allows remote attackers to cause a denial of service (crash) through a wireless Bluetooth connection via a malformed Logical Link Control and Adaptation Protocol (L2CAP) packet.
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in Red Hat Enterprise Linux 4. This issue is corrected in bluez-hcidump 1.32 as provided by Red Hat Enterprise
Linux 5.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>bluez-hcidump</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0670
https://nvd.nist.gov/vuln/detail/CVE-2006-0670
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0709">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-12T00:00:00</PublicDate>
    <Bugzilla id="1618013" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618013" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Metamail 2.7-50 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via e-mail messages with a long boundary attribute, a different vulnerability than CVE-2004-0105.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0217">RHSA-2006:0217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0217">RHSA-2006:0217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0217">RHSA-2006:0217</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0217">RHSA-2006:0217</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0709
https://nvd.nist.gov/vuln/detail/CVE-2006-0709
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0730">
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) &quot;potential hangs&quot; in the APPEND command and &quot;potential crashes&quot; in (2) dovecot-auth and (3) imap/pop3-login.  NOTE: vector 2 might be related to a double free vulnerability.
    </Details>
    <Statement xml:lang="en:us">
This issue only affected Dovecot versions 1.0beta1 and 1.0beta2.  Red Hat Enterprise Linux 4 shipped with an earlier version of Dovecot and is therefore not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0730
https://nvd.nist.gov/vuln/detail/CVE-2006-0730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0741">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-26T00:00:00</PublicDate>
    <Bugzilla id="1618014" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618014" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service (&quot;endless recursive fault&quot;) via unknown attack vectors related to a &quot;bad elf entry address.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0741
https://nvd.nist.gov/vuln/detail/CVE-2006-0741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0742">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-28T00:00:00</PublicDate>
    <Bugzilla id="1618015" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618015" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The die_if_kernel function in arch/ia64/kernel/unaligned.c in Linux kernel 2.6.x before 2.6.15.6, possibly when compiled with certain versions of gcc, has the &quot;noreturn&quot; attribute set, which allows local users to cause a denial of service by causing user faults on Itanium systems.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0742
https://nvd.nist.gov/vuln/detail/CVE-2006-0742
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0743">
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include log4net.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0743
https://nvd.nist.gov/vuln/detail/CVE-2006-0743
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0744">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-09T00:00:00</PublicDate>
    <Bugzilla id="1618016" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618016" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0744
https://nvd.nist.gov/vuln/detail/CVE-2006-0744
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0746">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-03T00:00:00</PublicDate>
    <Bugzilla id="1618017" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618017" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain patches for kpdf do not include all relevant patches from xpdf that were associated with CVE-2005-3627, which allows context-dependent attackers to exploit vulnerabilities that were present in CVE-2005-3627.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-03-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0262">RHSA-2006:0262</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-3.9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0746
https://nvd.nist.gov/vuln/detail/CVE-2006-0746
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0747">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-15T00:00:00</PublicDate>
    <Bugzilla id="1618019" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618019" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.4-4.0.rhel3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.9-1.rhel4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0747
https://nvd.nist.gov/vuln/detail/CVE-2006-0747
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0748">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-21T00:00:00</PublicDate>
    <Bugzilla id="1618020" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618020" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via &quot;an invalid and non-sensical ordering of table-related tags&quot; that results in a negative array index.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0748
https://nvd.nist.gov/vuln/detail/CVE-2006-0748
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0749">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="183537" url="https://bugzilla.redhat.com/show_bug.cgi?id=183537" xml:lang="en:us">
Firefox Tag Order Vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a &quot;particular sequence of HTML tags&quot; that leads to memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0749
https://nvd.nist.gov/vuln/detail/CVE-2006-0749
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0883">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0883
https://nvd.nist.gov/vuln/detail/CVE-2006-0883
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0884">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-21T00:00:00</PublicDate>
    <Bugzilla id="1618021" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618021" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The WYSIWYG rendering engine (&quot;rich mail&quot; editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0884
https://nvd.nist.gov/vuln/detail/CVE-2006-0884
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0898">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-23T00:00:00</PublicDate>
    <Bugzilla id="430522" url="https://bugzilla.redhat.com/show_bug.cgi?id=430522" xml:lang="en:us">
perl-Crypt-CBC weaker encryption with some ciphers
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0898
https://nvd.nist.gov/vuln/detail/CVE-2006-0898
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0903">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-20T00:00:00</PublicDate>
    <Bugzilla id="194613" url="https://bugzilla.redhat.com/show_bug.cgi?id=194613" xml:lang="en:us">
Mysql log file obfuscation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function.  NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0083">RHSA-2007:0083</Advisory>
        <Package name="mysql">mysql-0:5.0.30-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0903
https://nvd.nist.gov/vuln/detail/CVE-2006-0903
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0987">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-03T00:00:00</PublicDate>
    <Bugzilla id="873618" url="https://bugzilla.redhat.com/show_bug.cgi?id=873618" xml:lang="en:us">
bind: DDoS (traffic amplification) via DNS queries with spoofed IP addresses due to additional information delegation to arbitrary IP addresses
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The default configuration of ISC BIND before 9.4.1-P1, when configured as a caching name server, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of bind as shipped with Red Hat Enterprise Linux 5 and 6 and version of bind97 as shipped with Red Hat Enterprise Linux 5 as in the default configuration the named service accept DNS queries only from localhost.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>bind</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>bind</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0987
https://nvd.nist.gov/vuln/detail/CVE-2006-0987
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-0996">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-03-30T00:00:00</PublicDate>
    <Bugzilla id="1618022" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618022" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-0996
https://nvd.nist.gov/vuln/detail/CVE-2006-0996
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1014">
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail.  NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1014
https://nvd.nist.gov/vuln/detail/CVE-2006-1014
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1015">
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments.  NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1015
https://nvd.nist.gov/vuln/detail/CVE-2006-1015
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1017">
    <Details source="Mitre" xml:lang="en:us">
The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.
    </Details>
    <Statement xml:lang="en:us">
We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1017
https://nvd.nist.gov/vuln/detail/CVE-2006-1017
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1045">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-28T00:00:00</PublicDate>
    <Bugzilla id="1618023" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618023" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTML rendering engine in Mozilla Thunderbird 1.5, when &quot;Block loading of remote images in mail messages&quot; is enabled, does not properly block external images from inline HTML attachments, which could allow remote attackers to obtain sensitive information, such as application version or IP address, when the user reads the email and the external image is accessed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1045
https://nvd.nist.gov/vuln/detail/CVE-2006-1045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1052">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-11T00:00:00</PublicDate>
    <Bugzilla id="1618024" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618024" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1052
https://nvd.nist.gov/vuln/detail/CVE-2006-1052
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1056">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-04-19T00:00:00</PublicDate>
    <Bugzilla id="1618025" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618025" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1056
https://nvd.nist.gov/vuln/detail/CVE-2006-1056
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1057">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-19T00:00:00</PublicDate>
    <Bugzilla id="1618026" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618026" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gdm performs chown and chgrp operations on the .ICEauthority file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188302

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

This issue does not affect Red Hat Enterprise Linux 2.1 and 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0286">RHSA-2007:0286</Advisory>
        <Package name="gdm">gdm-1:2.6.0.5-7.rhel4.15</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1057
https://nvd.nist.gov/vuln/detail/CVE-2006-1057
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1058">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-12-19T00:00:00</PublicDate>
    <Bugzilla id="1618027" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618027" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0244">RHSA-2007:0244</Advisory>
        <Package name="busybox">busybox-0:1.00.rc1-7.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1058
https://nvd.nist.gov/vuln/detail/CVE-2006-1058
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1095">
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of mod_python as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1095
https://nvd.nist.gov/vuln/detail/CVE-2006-1095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1168">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-08T00:00:00</PublicDate>
    <Bugzilla id="201919" url="https://bugzilla.redhat.com/show_bug.cgi?id=201919" xml:lang="en:us">
ncompress: .bss buffer underflow in decompression
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.1</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Tavis Ormandy (Google Security Team) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0663">RHSA-2006:0663</Advisory>
        <Package name="ncompress">ncompress-0:4.2.4-39.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0663">RHSA-2006:0663</Advisory>
        <Package name="ncompress">ncompress-0:4.2.4-43.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5" impact="low">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2012-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2012:0308">RHSA-2012:0308</Advisory>
        <Package name="busybox">busybox-1:1.2.0-13.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6" impact="low">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2012-06-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2012:0810">RHSA-2012:0810</Advisory>
        <Package name="busybox">busybox-1:1.15.1-15.el6</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4" impact="low">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>busybox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncompress</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ncompress</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1168
https://nvd.nist.gov/vuln/detail/CVE-2006-1168
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1173">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-14T01:06:00</PublicDate>
    <Bugzilla id="1618028" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618028" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0515">RHSA-2006:0515</Advisory>
        <Package name="sendmail">sendmail-0:8.12.11-4.RHEL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0515">RHSA-2006:0515</Advisory>
        <Package name="sendmail">sendmail-0:8.13.1-3.RHEL4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1173
https://nvd.nist.gov/vuln/detail/CVE-2006-1173
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1174">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618029" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618029" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bugs:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193053
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229194

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0431">RHSA-2007:0431</Advisory>
        <Package name="shadow-utils">shadow-utils-2:4.0.3-29.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0276">RHSA-2007:0276</Advisory>
        <Package name="shadow-utils">shadow-utils-2:4.0.3-61.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1174
https://nvd.nist.gov/vuln/detail/CVE-2006-1174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1242">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-03-14T00:00:00</PublicDate>
    <Bugzilla id="1618031" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618031" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1242
https://nvd.nist.gov/vuln/detail/CVE-2006-1242
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1251">
    <Bugzilla id="191082" url="https://bugzilla.redhat.com/show_bug.cgi?id=191082" xml:lang="en:us">
sa-exim 4.2 vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  greylistclean.cron is not supplied in the exim packages as distributed with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1251
https://nvd.nist.gov/vuln/detail/CVE-2006-1251
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1329">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-09T00:00:00</PublicDate>
    <Bugzilla id="429254" url="https://bugzilla.redhat.com/show_bug.cgi?id=429254" xml:lang="en:us">
jabberd SASL DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SASL negotiation in Jabber Studio jabberd before 2.0s11 allows remote attackers to cause a denial of service (&quot;c2s segfault&quot;) by sending a &quot;response stanza before an auth stanza&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1329
https://nvd.nist.gov/vuln/detail/CVE-2006-1329
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1342">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-03-04T00:00:00</PublicDate>
    <Bugzilla id="1618032" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618032" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1342
https://nvd.nist.gov/vuln/detail/CVE-2006-1342
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1343">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-03-04T00:00:00</PublicDate>
    <Bugzilla id="1618033" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618033" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1343
https://nvd.nist.gov/vuln/detail/CVE-2006-1343
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1354">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618034" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618034" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via &quot;Insufficient input validation&quot; in the EAP-MSCHAPv2 state machine module.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0271">RHSA-2006:0271</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-2.RHEL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0271">RHSA-2006:0271</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-3.RHEL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1354
https://nvd.nist.gov/vuln/detail/CVE-2006-1354
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1390">
    <Bugzilla id="187353" url="https://bugzilla.redhat.com/show_bug.cgi?id=187353" xml:lang="en:us">
nethack: Local privilege escalation via crafted score file
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The configuration of NetHack 3.4.3-r1 and earlier, Falcon's Eye 1.9.4a and earlier, and Slash'EM 0.0.760 and earlier on Gentoo Linux allows local users in the games group to modify saved games files to execute arbitrary code via buffer overflows and overwrite arbitrary files via symlink attacks.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1390
https://nvd.nist.gov/vuln/detail/CVE-2006-1390
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1490">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-28T00:00:00</PublicDate>
    <Bugzilla id="1618036" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618036" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a &quot;binary safety&quot; issue.  NOTE: this issue has been referred to as a &quot;memory leak,&quot; but it is an information leak that discloses memory contents.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.2-30.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0276">RHSA-2006:0276</Advisory>
        <Package name="php">php-0:4.3.9-3.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1490
https://nvd.nist.gov/vuln/detail/CVE-2006-1490
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1494">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-08T00:00:00</PublicDate>
    <Bugzilla id="1618037" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618037" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.2-33.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.9-3.15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1494
https://nvd.nist.gov/vuln/detail/CVE-2006-1494
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1516">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-02T00:00:00</PublicDate>
    <Bugzilla id="1618038" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618038" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1516
https://nvd.nist.gov/vuln/detail/CVE-2006-1516
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1517">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-02T00:00:00</PublicDate>
    <Bugzilla id="1618039" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618039" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1517
https://nvd.nist.gov/vuln/detail/CVE-2006-1517
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1522">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-04-10T00:00:00</PublicDate>
    <Bugzilla id="1618040" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618040" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1522
https://nvd.nist.gov/vuln/detail/CVE-2006-1522
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1525">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618041" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618041" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1525
https://nvd.nist.gov/vuln/detail/CVE-2006-1525
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1526">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-05-02T14:00:00</PublicDate>
    <Bugzilla id="1618042" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618042" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a &quot;&amp;&quot; instead of a &quot;*&quot; operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0451">RHSA-2006:0451</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.25.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1526
https://nvd.nist.gov/vuln/detail/CVE-2006-1526
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1527">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-05-02T00:00:00</PublicDate>
    <Bugzilla id="1618043" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618043" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1527
https://nvd.nist.gov/vuln/detail/CVE-2006-1527
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1528">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-08-30T00:00:00</PublicDate>
    <Bugzilla id="1618044" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618044" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1528
https://nvd.nist.gov/vuln/detail/CVE-2006-1528
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1542">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-09-22T00:00:00</PublicDate>
    <Bugzilla id="430640" url="https://bugzilla.redhat.com/show_bug.cgi?id=430640" xml:lang="en:us">
python buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a &quot;stack overflow,&quot; and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function.  NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1542
https://nvd.nist.gov/vuln/detail/CVE-2006-1542
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1546">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-22T00:00:00</PublicDate>
    <Bugzilla id="430530" url="https://bugzilla.redhat.com/show_bug.cgi?id=430530" xml:lang="en:us">
struts bypass validation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>Red Hat Application Server 3AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1546
https://nvd.nist.gov/vuln/detail/CVE-2006-1546
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1547">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-22T00:00:00</PublicDate>
    <Bugzilla id="1618045" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618045" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>Red Hat Application Server 3AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1547
https://nvd.nist.gov/vuln/detail/CVE-2006-1547
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1548">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-22T00:00:00</PublicDate>
    <Bugzilla id="430531" url="https://bugzilla.redhat.com/show_bug.cgi?id=430531" xml:lang="en:us">
struts LookupDispatchAction XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>Red Hat Application Server 3AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>Red Hat Application Server v2 4AS</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0281">RHSA-2006:0281</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1548
https://nvd.nist.gov/vuln/detail/CVE-2006-1548
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1549">
    <Details source="Mitre" xml:lang="en:us">
PHP 4.4.2 and 5.1.2 allows local users to cause a crash (segmentation fault) by defining and executing a recursive function.  NOTE: it has been reported by a reliable third party that some later versions are also affected.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1549
https://nvd.nist.gov/vuln/detail/CVE-2006-1549
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1550">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-29T00:00:00</PublicDate>
    <Bugzilla id="187556" url="https://bugzilla.redhat.com/show_bug.cgi?id=187556" xml:lang="en:us">
Dia multiple buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the xfig import code (xfig-import.c) in Dia 0.87 and later before 0.95-pre6 allow user-assisted attackers to have an unknown impact via a crafted xfig file, possibly involving an invalid (1) color index, (2) number of points, or (3) depth.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0280">RHSA-2006:0280</Advisory>
        <Package name="dia">dia-1:0.94-5.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1550
https://nvd.nist.gov/vuln/detail/CVE-2006-1550
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1608">
    <Details source="Mitre" xml:lang="en:us">
The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues:
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1608
https://nvd.nist.gov/vuln/detail/CVE-2006-1608
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1624">
    <Details source="Mitre" xml:lang="en:us">
The default configuration of syslogd in the Linux sysklogd package does not enable the -x (disable name lookups) option, which allows remote attackers to cause a denial of service (traffic amplification) via messages with spoofed source IP addresses.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a security issue. Enabling the -r option is not suggested without the -x option which is clearly documented in the /etc/sysconfig/syslog configuration file.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1624
https://nvd.nist.gov/vuln/detail/CVE-2006-1624
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1721">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-15T00:00:00</PublicDate>
    <Bugzilla id="189814" url="https://bugzilla.redhat.com/show_bug.cgi?id=189814" xml:lang="en:us">
cyrus-sasl digest-md5 DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0878">RHSA-2007:0878</Advisory>
        <Package name="cyrus-sasl">cyrus-sasl-0:2.1.15-15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0795">RHSA-2007:0795</Advisory>
        <Package name="cyrus-sasl">cyrus-sasl-0:2.1.19-14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1721
https://nvd.nist.gov/vuln/detail/CVE-2006-1721
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1724">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618047" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618047" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1724
https://nvd.nist.gov/vuln/detail/CVE-2006-1724
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1727">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618048" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618048" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with &quot;Print Preview&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1727
https://nvd.nist.gov/vuln/detail/CVE-2006-1727
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1728">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618049" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618049" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via unknown vectors related to the crypto.generateCRMFRequest method.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1728
https://nvd.nist.gov/vuln/detail/CVE-2006-1728
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1729">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618050" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618050" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1729
https://nvd.nist.gov/vuln/detail/CVE-2006-1729
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1730">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618051" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618051" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1730
https://nvd.nist.gov/vuln/detail/CVE-2006-1730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1731">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618052" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618052" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1731
https://nvd.nist.gov/vuln/detail/CVE-2006-1731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1732">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618053" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618053" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to bypass same-origin protections and conduct cross-site scripting (XSS) attacks via unspecified vectors involving the window.controllers array.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1732
https://nvd.nist.gov/vuln/detail/CVE-2006-1732
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1733">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618054" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618054" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) &quot;by inserting an XBL method into the DOM's document.body prototype chain.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1733
https://nvd.nist.gov/vuln/detail/CVE-2006-1733
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1734">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618055" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618055" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the &quot;clone parent&quot; internal function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1734
https://nvd.nist.gov/vuln/detail/CVE-2006-1734
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1735">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618056" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618056" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1735
https://nvd.nist.gov/vuln/detail/CVE-2006-1735
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1737">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618057" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618057" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1737
https://nvd.nist.gov/vuln/detail/CVE-2006-1737
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1738">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618058" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618058" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1738
https://nvd.nist.gov/vuln/detail/CVE-2006-1738
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1739">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618059" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618059" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1739
https://nvd.nist.gov/vuln/detail/CVE-2006-1739
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1740">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618060" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618060" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to a malicious site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1740
https://nvd.nist.gov/vuln/detail/CVE-2006-1740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1741">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618061" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618061" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) &quot;using a modal alert to suspend an event handler while a new page is being loaded&quot;, (2) using eval(), and using certain variants involving (3) &quot;new Script;&quot; and (4) using window.__proto__ to extend eval, aka &quot;cross-site JavaScript injection&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1741
https://nvd.nist.gov/vuln/detail/CVE-2006-1741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1742">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618062" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618062" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1742
https://nvd.nist.gov/vuln/detail/CVE-2006-1742
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1790">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-04-14T00:00:00</PublicDate>
    <Bugzilla id="1618063" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618063" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0328">RHSA-2006:0328</Advisory>
        <Package name="firefox">firefox-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0329">RHSA-2006:0329</Advisory>
        <Package name="devhelp">devhelp-0:0.9.2-2.4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-04-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0330">RHSA-2006:0330</Advisory>
        <Package name="thunderbird">thunderbird-0:1.0.8-1.4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1790
https://nvd.nist.gov/vuln/detail/CVE-2006-1790
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1855">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-05-18T00:00:00</PublicDate>
    <Bugzilla id="1618064" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618064" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1855
https://nvd.nist.gov/vuln/detail/CVE-2006-1855
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1856">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-09-28T00:00:00</PublicDate>
    <Bugzilla id="1618066" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618066" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1856
https://nvd.nist.gov/vuln/detail/CVE-2006-1856
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1857">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-19T00:00:00</PublicDate>
    <Bugzilla id="1618067" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618067" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1857
https://nvd.nist.gov/vuln/detail/CVE-2006-1857
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1858">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-05-19T00:00:00</PublicDate>
    <Bugzilla id="1618068" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618068" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1858
https://nvd.nist.gov/vuln/detail/CVE-2006-1858
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1861">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-15T00:00:00</PublicDate>
    <Bugzilla id="484437" url="https://bugzilla.redhat.com/show_bug.cgi?id=484437" xml:lang="en:us">
freetype: multiple integer overflow vulnerabilities
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1062">RHSA-2009:1062</Advisory>
        <Package name="freetype">freetype-0:2.0.3-17.el21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.4-4.0.rhel3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0329">RHSA-2009:0329</Advisory>
        <Package name="freetype">freetype-0:2.1.4-12.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.9-1.rhel4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0329">RHSA-2009:0329</Advisory>
        <Package name="freetype">freetype-0:2.1.9-10.el4.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1861
https://nvd.nist.gov/vuln/detail/CVE-2006-1861
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1862">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-05-18T00:00:00</PublicDate>
    <Bugzilla id="1618069" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618069" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1862
https://nvd.nist.gov/vuln/detail/CVE-2006-1862
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1863">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-20T00:00:00</PublicDate>
    <Bugzilla id="1618070" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618070" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via &quot;..\\&quot; sequences, a similar vulnerability to CVE-2006-1864.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1863
https://nvd.nist.gov/vuln/detail/CVE-2006-1863
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1864">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-26T00:00:00</PublicDate>
    <Bugzilla id="1618071" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618071" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via &quot;..\\&quot; sequences, a similar vulnerability to CVE-2006-1863.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1864
https://nvd.nist.gov/vuln/detail/CVE-2006-1864
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1931">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-06-30T00:00:00</PublicDate>
    <Bugzilla id="1618072" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618072" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0427">RHSA-2006:0427</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1931
https://nvd.nist.gov/vuln/detail/CVE-2006-1931
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1932">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618073" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618073" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1932
https://nvd.nist.gov/vuln/detail/CVE-2006-1932
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1933">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618074" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618074" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (large or infinite loops) viarafted packets to the (1) UMA and (2) BER dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1933
https://nvd.nist.gov/vuln/detail/CVE-2006-1933
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1934">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618075" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618075" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) ALCAP dissector, (2) Network Instruments file code, or (3) NetXray/Windows Sniffer file code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1934
https://nvd.nist.gov/vuln/detail/CVE-2006-1934
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1935">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618076" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618076" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Ethereal 0.9.15 up to 0.10.14 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the COPS dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1935
https://nvd.nist.gov/vuln/detail/CVE-2006-1935
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1936">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618077" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618077" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1936
https://nvd.nist.gov/vuln/detail/CVE-2006-1936
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1937">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618078" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618078" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) multiple vectors in H.248, and the (2) X.509if, (3) SRVLOC, (4) H.245, (5) AIM, and (6) general packet dissectors; and (7) the statistics counter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1937
https://nvd.nist.gov/vuln/detail/CVE-2006-1937
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1938">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618079" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618079" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1938
https://nvd.nist.gov/vuln/detail/CVE-2006-1938
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1939">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618080" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618080" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1939
https://nvd.nist.gov/vuln/detail/CVE-2006-1939
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1940">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618081" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618081" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Ethereal 0.10.4 up to 0.10.14 allows remote attackers to cause a denial of service (abort) via the SNDCP dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0420">RHSA-2006:0420</Advisory>
        <Package name="ethereal">ethereal-0:0.99.0-EL3.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1940
https://nvd.nist.gov/vuln/detail/CVE-2006-1940
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-1990">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-24T00:00:00</PublicDate>
    <Bugzilla id="1618082" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618082" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.2-33.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.9-3.15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0501">RHSA-2006:0501</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-1990
https://nvd.nist.gov/vuln/detail/CVE-2006-1990
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2024">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-03T00:00:00</PublicDate>
    <Bugzilla id="1618083" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618083" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain &quot;codec cleanup methods&quot; in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2024
https://nvd.nist.gov/vuln/detail/CVE-2006-2024
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2025">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-03T00:00:00</PublicDate>
    <Bugzilla id="1618084" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618084" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the TIFFFetchData function in tif_dirread.c for libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted TIFF image.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2025
https://nvd.nist.gov/vuln/detail/CVE-2006-2025
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2026">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-03T00:00:00</PublicDate>
    <Bugzilla id="1618085" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618085" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to &quot;setfield/getfield methods in cleanup functions.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2026
https://nvd.nist.gov/vuln/detail/CVE-2006-2026
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2050">
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in dcboard.cgi in DCScripts DCForumLite 3.0 allows remote attackers to execute arbitrary SQL commands via the az parameter.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a security issue. The FastCGI server is local trusted code and not under the control of an attacker, no trust boundary is crossed.

For more information please see:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-2050
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2050
https://nvd.nist.gov/vuln/detail/CVE-2006-2050
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2071">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-17T00:00:00</PublicDate>
    <Bugzilla id="1618086" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618086" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment.  NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0579">RHSA-2006:0579</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2071
https://nvd.nist.gov/vuln/detail/CVE-2006-2071
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2073">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in ISC BIND allows remote attackers to cause a denial of service via a crafted DNS message with a &quot;broken&quot; TSIG, as demonstrated by the OUSPG PROTOS DNS test suite.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the version of bind as shipped with Red Hat Enterprise Linux 5.  We do not believe this issue has a security consequence for earlier versions of Red Hat Enterprise Linux.  For details please see
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192192
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2073
https://nvd.nist.gov/vuln/detail/CVE-2006-2073
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2083">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-04-22T00:00:00</PublicDate>
    <Bugzilla id="190207" url="https://bugzilla.redhat.com/show_bug.cgi?id=190207" xml:lang="en:us">
CVE-2006-2083 rsync buffer overflow issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the receive_xattr function in the extended attributes patch (xattr.c) for rsync before 2.6.8 might allow attackers to execute arbitrary code via crafted extended attributes that trigger a buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of rsync distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2083
https://nvd.nist.gov/vuln/detail/CVE-2006-2083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2120">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-02-08T00:00:00</PublicDate>
    <Bugzilla id="1618087" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618087" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The TIFFToRGB function in libtiff before 3.8.1 allows remote attackers to cause a denial of service (crash) via a crafted TIFF image with Yr/Yg/Yb values that exceed the YCR/YCG/YCB values, which triggers an out-of-bounds read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0425">RHSA-2006:0425</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2120
https://nvd.nist.gov/vuln/detail/CVE-2006-2120
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2193">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-07T00:00:00</PublicDate>
    <Bugzilla id="194362" url="https://bugzilla.redhat.com/show_bug.cgi?id=194362" xml:lang="en:us">
tiff2pdf buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TIFF file with a DocumentName tag that contains UTF-8 characters, which triggers the overflow when a character is sign extended to an integer that produces more digits than expected in an sprintf call.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect Red Hat Enterprise Linux 2.1 and 3

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0848">RHSA-2008:0848</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12.el4_7.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2193
https://nvd.nist.gov/vuln/detail/CVE-2006-2193
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2194">
    <Details source="Mitre" xml:lang="en:us">
The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  The winbind plugin is not shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2194
https://nvd.nist.gov/vuln/detail/CVE-2006-2194
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2198">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-29T00:00:00</PublicDate>
    <Bugzilla id="1618088" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618088" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.6.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2198
https://nvd.nist.gov/vuln/detail/CVE-2006-2198
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2199">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-29T00:00:00</PublicDate>
    <Bugzilla id="1618089" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618089" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.6.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2199
https://nvd.nist.gov/vuln/detail/CVE-2006-2199
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2223">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-03T00:00:00</PublicDate>
    <Bugzilla id="1618091" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618091" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.96.2-11.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.98.3-2.4E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2223
https://nvd.nist.gov/vuln/detail/CVE-2006-2223
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2224">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-03T00:00:00</PublicDate>
    <Bugzilla id="1618092" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618092" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.96.2-11.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.98.3-2.4E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2224
https://nvd.nist.gov/vuln/detail/CVE-2006-2224
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2271">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-08T00:00:00</PublicDate>
    <Bugzilla id="1618093" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618093" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2271
https://nvd.nist.gov/vuln/detail/CVE-2006-2271
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2272">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-08T00:00:00</PublicDate>
    <Bugzilla id="1618094" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618094" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2272
https://nvd.nist.gov/vuln/detail/CVE-2006-2272
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2274">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-09T00:00:00</PublicDate>
    <Bugzilla id="1618096" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618096" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0493">RHSA-2006:0493</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2274
https://nvd.nist.gov/vuln/detail/CVE-2006-2274
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2275">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-09T00:00:00</PublicDate>
    <Bugzilla id="1618097" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618097" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (deadlock) via a large number of small messages to a receiver application that cannot process the messages quickly enough, which leads to &quot;spillover of the receive buffer.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2275
https://nvd.nist.gov/vuln/detail/CVE-2006-2275
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2276">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-29T00:00:00</PublicDate>
    <Bugzilla id="1618099" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618099" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.96.2-11.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0525">RHSA-2006:0525</Advisory>
        <Package name="quagga">quagga-0:0.98.3-2.4E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0533">RHSA-2006:0533</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2276
https://nvd.nist.gov/vuln/detail/CVE-2006-2276
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2313">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-23T00:00:00</PublicDate>
    <Bugzilla id="1618100" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618100" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of &quot;Encoding-Based SQL Injection.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.15-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="postgresql">postgresql-0:7.4.13-2.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2313
https://nvd.nist.gov/vuln/detail/CVE-2006-2313
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2314">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2005-05-23T00:00:00</PublicDate>
    <Bugzilla id="1618101" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618101" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the &quot;\&quot; (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of &quot;Encoding-Based SQL Injection.&quot; NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.15-2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-05-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0526">RHSA-2006:0526</Advisory>
        <Package name="postgresql">postgresql-0:7.4.13-2.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2314
https://nvd.nist.gov/vuln/detail/CVE-2006-2314
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2369">
    <Details source="Mitre" xml:lang="en:us">
RealVNC 4.1.1, and other products that use RealVNC such as AdderLink IP and Cisco CallManager, allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as &quot;Type 1 - None&quot;, which is accepted even if it is not offered by the server, as originally demonstrated using a long password.
    </Details>
    <Statement xml:lang="en:us">
This issue only affected version 4.1.1 and not the versions distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2369
https://nvd.nist.gov/vuln/detail/CVE-2006-2369
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2414">
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via &quot;..&quot; sequences in the (1) LIST or (2) DELETE IMAP command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of Dovecot distributed with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2414
https://nvd.nist.gov/vuln/detail/CVE-2006-2414
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2426">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-05-14T00:00:00</PublicDate>
    <Bugzilla id="395481" url="https://bugzilla.redhat.com/show_bug.cgi?id=395481" xml:lang="en:us">
Untrusted applet causes DoS by filling up disk space
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2009-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0392">RHSA-2009:0392</Advisory>
        <Package name="java-1.6.0-sun">java-1.6.0-sun-1:1.6.0.13-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2009-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0394">RHSA-2009:0394</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.18-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-04-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0377">RHSA-2009:0377</Advisory>
        <Package name="java-1.6.0-openjdk">java-1.6.0-openjdk-1:1.6.0.0-0.30.b09.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2009-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1662">RHSA-2009:1662</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0392">RHSA-2009:0392</Advisory>
        <Package name="java-1.6.0-sun">java-1.6.0-sun-1:1.6.0.13-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-03-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0394">RHSA-2009:0394</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.18-1jpp.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2426
https://nvd.nist.gov/vuln/detail/CVE-2006-2426
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2440">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-01-02T00:00:00</PublicDate>
    <Bugzilla id="1618102" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618102" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the libMagick component of ImageMagick 6.0.6.2 might allow attackers to execute arbitrary code via an image index array that triggers the overflow during filename glob expansion by the ExpandFilenames function.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192278

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16.0.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2440
https://nvd.nist.gov/vuln/detail/CVE-2006-2440
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2444">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-20T00:00:00</PublicDate>
    <Bugzilla id="1618103" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618103" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0437">RHSA-2006:0437</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0580">RHSA-2006:0580</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2444
https://nvd.nist.gov/vuln/detail/CVE-2006-2444
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2446">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-10T00:00:00</PublicDate>
    <Bugzilla id="1618104" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618104" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition between the kfree_skb and __skb_unlink functions in the socket buffer handling in Linux kernel 2.6.9, and possibly other versions, allows remote attackers to cause a denial of service (crash), as demonstrated using the TCP stress tests from the LTP test suite.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2446
https://nvd.nist.gov/vuln/detail/CVE-2006-2446
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2447">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-06T00:00:00</PublicDate>
    <Bugzilla id="1618105" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618105" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0543">RHSA-2006:0543</Advisory>
        <Package name="spamassassin">spamassassin-0:3.0.6-1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2447
https://nvd.nist.gov/vuln/detail/CVE-2006-2447
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2448">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-09T00:00:00</PublicDate>
    <Bugzilla id="1618106" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618106" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2448
https://nvd.nist.gov/vuln/detail/CVE-2006-2448
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2449">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-14T00:00:00</PublicDate>
    <Bugzilla id="1618107" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618107" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0548">RHSA-2006:0548</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-5.12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2449
https://nvd.nist.gov/vuln/detail/CVE-2006-2449
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2450">
    <Details source="Mitre" xml:lang="en:us">
auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as &quot;Type 1 - None&quot;, which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of LibVNCServer as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2450
https://nvd.nist.gov/vuln/detail/CVE-2006-2450
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2451">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-06T00:00:00</PublicDate>
    <Bugzilla id="195902" url="https://bugzilla.redhat.com/show_bug.cgi?id=195902" xml:lang="en:us">
Possible privilege escalation through prctl() and suid_dumpable
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0574">RHSA-2006:0574</Advisory>
        <Package name="kernel">kernel-0:2.6.9-34.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2451
https://nvd.nist.gov/vuln/detail/CVE-2006-2451
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2453">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-06T00:00:00</PublicDate>
    <Bugzilla id="1618108" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618108" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified format string vulnerabilities in Dia have unspecified impact and attack vectors, a different set of issues than CVE-2006-2480.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0541">RHSA-2006:0541</Advisory>
        <Package name="dia">dia-1:0.94-5.7.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2453
https://nvd.nist.gov/vuln/detail/CVE-2006-2453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2480">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-05-10T00:00:00</PublicDate>
    <Bugzilla id="1618109" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618109" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename.  NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0541">RHSA-2006:0541</Advisory>
        <Package name="dia">dia-1:0.94-5.7.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2480
https://nvd.nist.gov/vuln/detail/CVE-2006-2480
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2502">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of cyrus-imapd distributed with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2502
https://nvd.nist.gov/vuln/detail/CVE-2006-2502
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2563">
    <Details source="Mitre" xml:lang="en:us">
The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2563
https://nvd.nist.gov/vuln/detail/CVE-2006-2563
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2607">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-20T00:00:00</PublicDate>
    <Bugzilla id="193146" url="https://bugzilla.redhat.com/show_bug.cgi?id=193146" xml:lang="en:us">
Jobs start from root when pam_limits enabled
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0539">RHSA-2006:0539</Advisory>
        <Package name="vixie-cron">vixie-cron-4:4.1-44.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2607
https://nvd.nist.gov/vuln/detail/CVE-2006-2607
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2656">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-05-25T00:00:00</PublicDate>
    <Bugzilla id="193166" url="https://bugzilla.redhat.com/show_bug.cgi?id=193166" xml:lang="en:us">
tiffsplit buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.  NOTE: tiffsplit is not setuid.  If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2656
https://nvd.nist.gov/vuln/detail/CVE-2006-2656
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2660">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-11T00:00:00</PublicDate>
    <Bugzilla id="195539" url="https://bugzilla.redhat.com/show_bug.cgi?id=195539" xml:lang="en:us">
CVE-2006-2660 tempnam() unique filename bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.
    </Details>
    <Statement xml:lang="en:us">
This is not an issue that affects users of Red Hat Enterprise Linux.
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=196255
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2660
https://nvd.nist.gov/vuln/detail/CVE-2006-2660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2661">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-05-15T00:00:00</PublicDate>
    <Bugzilla id="1618110" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618110" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.4-4.0.rhel3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.9-1.rhel4.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2661
https://nvd.nist.gov/vuln/detail/CVE-2006-2661
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2753">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-05-31T00:00:00</PublicDate>
    <Bugzilla id="1618111" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618111" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2753
https://nvd.nist.gov/vuln/detail/CVE-2006-2753
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2754">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
    </Details>
    <Statement xml:lang="en:us">
This issue is not exploitable as the status file is only written to and read by the slurpd process.  Therefore this is not a vulnerability that affects Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2754
https://nvd.nist.gov/vuln/detail/CVE-2006-2754
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2758">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-18T00:00:00</PublicDate>
    <Bugzilla id="2187715" url="https://bugzilla.redhat.com/show_bug.cgi?id=2187715" xml:lang="en:us">
jetty: Jetty URL encoded format directory traversal
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-22</CWE>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary files via a %2e%2e%5c (encoded ../) in the URL.  NOTE: this might be the same issue as CVE-2005-3747.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in Jetty. This issue could allow a remote attacker to send a specially-crafted URL request containing hexadecimal URL encoded &quot;dot-dot&quot; sequences (%2e%2e%5c) to traverse directories and view files and folders outside of the web root directory.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>jetty</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2758
https://nvd.nist.gov/vuln/detail/CVE-2006-2758
https://www.eclipse.org/jetty/security_reports.php
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2759">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="2187716" url="https://bugzilla.redhat.com/show_bug.cgi?id=2187716" xml:lang="en:us">
jetty: .jsp extension source code disclosure
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-178</CWE>
    <Details source="Mitre" xml:lang="en:us">
jetty 6.0.x (jetty6) beta16 allows remote attackers to read arbitrary script source code via a capital P in the .jsp extension, and probably other mixed case manipulations.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in Jetty that could allow a remote attacker to obtain sensitive information. If an attacker sends a specially-crafted request for a known &quot;.jsp&quot; file using an uppercase letter P in the file extension (.jsP), the requested file's source code will be returned if the file system being used is case-sensitive.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>jetty</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2759
https://nvd.nist.gov/vuln/detail/CVE-2006-2759
https://www.eclipse.org/jetty/security_reports.php
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2776">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618112" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618112" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certain privileged UI code in Mozilla Firefox and Thunderbird before 1.5.0.4 calls content-defined setters on an object prototype, which allows remote attackers to execute code at a higher privilege than intended.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2776
https://nvd.nist.gov/vuln/detail/CVE-2006-2776
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2778">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618113" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618113" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2778
https://nvd.nist.gov/vuln/detail/CVE-2006-2778
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2779">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-06-02T00:00:00</PublicDate>
    <Bugzilla id="1618114" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618114" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird before 1.5.0.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) nested &lt;option&gt; tags in a select tag, (2) a DOMNodeRemoved mutation event, (3) &quot;Content-implemented tree views,&quot; (4) BoxObjects, (5) the XBL implementation, (6) an iframe that attempts to remove itself, which leads to memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2779
https://nvd.nist.gov/vuln/detail/CVE-2006-2779
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2780">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-06-02T00:00:00</PublicDate>
    <Bugzilla id="1618115" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618115" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via &quot;jsstr tagify,&quot; which leads to memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2780
https://nvd.nist.gov/vuln/detail/CVE-2006-2780
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2781">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-06-02T00:00:00</PublicDate>
    <Bugzilla id="193963" url="https://bugzilla.redhat.com/show_bug.cgi?id=193963" xml:lang="en:us">
(seamonkey): DOS/arbitrary code execution vuln with vcards
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2781
https://nvd.nist.gov/vuln/detail/CVE-2006-2781
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2782">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618116" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618116" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.5.0.2 does not fix all test cases associated with CVE-2006-1729, which allows remote attackers to read arbitrary files by inserting the target filename into a text box, then turning that box into a file upload control.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2782
https://nvd.nist.gov/vuln/detail/CVE-2006-2782
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2783">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618117" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618117" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox and Thunderbird before 1.5.0.4 strip the Unicode Byte-order-Mark (BOM) from a UTF-8 page before the page is passed to the parser, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a BOM sequence in the middle of a dangerous tag such as SCRIPT.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2783
https://nvd.nist.gov/vuln/detail/CVE-2006-2783
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2784">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618118" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618118" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The PLUGINSPAGE functionality in Mozilla Firefox before 1.5.0.4 allows remote user-assisted attackers to execute privileged code by tricking a user into installing missing plugins and selecting the &quot;Manual Install&quot; button, then using nested javascript: URLs.  NOTE: the manual install button is used for downloading software from a remote web site, so this issue would not cross privilege boundaries if the user progresses to the point of installing malicious software from the attacker-controlled site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2784
https://nvd.nist.gov/vuln/detail/CVE-2006-2784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2785">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618119" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618119" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 1.5.0.4 allows user-assisted remote attackers to inject arbitrary web script or HTML by tricking a user into (1) performing a &quot;View Image&quot; on a broken image in which the SRC attribute contains a Javascript URL, or (2) selecting &quot;Show only this frame&quot; on a frame whose SRC attribute contains a Javascript URL.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2785
https://nvd.nist.gov/vuln/detail/CVE-2006-2785
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2786">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618120" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618120" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
HTTP response smuggling vulnerability in Mozilla Firefox and Thunderbird before 1.5.0.4, when used with certain proxy servers, allows remote attackers to cause Firefox to interpret certain responses as if they were responses from two different sites via (1) invalid HTTP response headers with spaces between the header name and the colon, which might not be ignored in some cases, or (2) HTTP 1.1 headers through an HTTP 1.0 proxy, which are ignored by the proxy but processed by the client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2786
https://nvd.nist.gov/vuln/detail/CVE-2006-2786
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2787">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618121" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618121" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
EvalInSandbox in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to gain privileges via javascript that calls the valueOf method on objects that were created outside of the sandbox.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2787
https://nvd.nist.gov/vuln/detail/CVE-2006-2787
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2788">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618122" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618122" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the getRawDER function for nsIX509Cert in Firefox allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via certain Javascript code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0578">RHSA-2006:0578</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.2-0.1.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2788
https://nvd.nist.gov/vuln/detail/CVE-2006-2788
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2789">
    <Details source="Mitre" xml:lang="en:us">
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when &quot;load images if sender in addressbook&quot; is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted &quot;From&quot; header that triggers an assert error in camel-internet-address.c when a null pointer is used.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of Evolution as distributed with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2789
https://nvd.nist.gov/vuln/detail/CVE-2006-2789
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2842">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-01T00:00:00</PublicDate>
    <Bugzilla id="1618123" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618123" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter.  NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled.  Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE.  However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0547">RHSA-2006:0547</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-7.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0547">RHSA-2006:0547</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.6-7.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2842
https://nvd.nist.gov/vuln/detail/CVE-2006-2842
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2906">
    <Details source="Mitre" xml:lang="en:us">
The LZW decoding in the gdImageCreateFromGifPtr function in the Thomas Boutell graphics draw (GD) library (aka libgd) 2.0.33 allows remote attackers to cause a denial of service (CPU consumption) via malformed GIF data that causes an infinite loop.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2906
https://nvd.nist.gov/vuln/detail/CVE-2006-2906
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2916">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2024-01-21T00:00:00</PublicDate>
    <Bugzilla id="2259536" url="https://bugzilla.redhat.com/show_bug.cgi?id=2259536" xml:lang="en:us">
arts: does not check the return value of the setuid  which prevents artsd from dropping privileges
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>6.7</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-273</CWE>
    <Details source="Mitre" xml:lang="en:us">
artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A vulnerability was found in artswrapper in aRts. When running a setuid root, it does not check the return value of the setuid function call. This flaw allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. We do not ship aRts as setuid root on Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
    </Mitigation>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>arts</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2916
https://nvd.nist.gov/vuln/detail/CVE-2006-2916
https://mail.gnome.org/archives/beast/2006-December/msg00025.html
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2932">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-22T00:00:00</PublicDate>
    <Bugzilla id="1618124" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618124" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in the restore_all code path of the 4/4GB split support for non-hugemem Linux kernels on Red Hat Linux Desktop and Enterprise Linux 4 allows local users to cause a denial of service (panic) via unspecified vectors.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Kirill Korotaev for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2932
https://nvd.nist.gov/vuln/detail/CVE-2006-2932
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2933">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-25T00:00:00</PublicDate>
    <Bugzilla id="1618125" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618125" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
kdesktop_lock in kdebase before 3.1.3-5.11 for KDE in Red Hat Enterprise Linux (RHEL) 3 does not properly terminate, which can prevent the screensaver from activating or prevent users from manually locking the desktop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0576">RHSA-2006:0576</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2933
https://nvd.nist.gov/vuln/detail/CVE-2006-2933
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2934">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-30T00:00:00</PublicDate>
    <Bugzilla id="1618126" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618126" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0575">RHSA-2006:0575</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2934
https://nvd.nist.gov/vuln/detail/CVE-2006-2934
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2935">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-27T00:00:00</PublicDate>
    <Bugzilla id="1618127" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618127" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0012">RHSA-2007:0012</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.64</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0013">RHSA-2007:0013</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.71</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2935
https://nvd.nist.gov/vuln/detail/CVE-2006-2935
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2936">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-26T00:00:00</PublicDate>
    <Bugzilla id="1618128" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618128" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2936
https://nvd.nist.gov/vuln/detail/CVE-2006-2936
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2937">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="430655" url="https://bugzilla.redhat.com/show_bug.cgi?id=430655" xml:lang="en:us">
openssl ASN.1 DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl095a">openssl095a-0:0.9.5a-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096">openssl096-0:0.9.6-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2937
https://nvd.nist.gov/vuln/detail/CVE-2006-2937
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2940">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="430654" url="https://bugzilla.redhat.com/show_bug.cgi?id=430654" xml:lang="en:us">
openssl public key DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) &quot;public exponent&quot; or (2) &quot;public modulus&quot; values in X.509 certificates that require extra time to process when using RSA signature verification.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl095a">openssl095a-0:0.9.5a-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096">openssl096-0:0.9.6-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2940
https://nvd.nist.gov/vuln/detail/CVE-2006-2940
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-2941">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-04T00:00:00</PublicDate>
    <Bugzilla id="1618129" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618129" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving &quot;standards-breaking RFC 2231 formatted headers&quot;.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Barry Warsaw for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0600">RHSA-2006:0600</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-25.rhel3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0600">RHSA-2006:0600</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-2941
https://nvd.nist.gov/vuln/detail/CVE-2006-2941
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3005">
    <Details source="Mitre" xml:lang="en:us">
The JPEG library in media-libs/jpeg before 6b-r7 on Gentoo Linux is built without the -maxmem feature, which could allow context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted JPEG file that exceeds the intended memory limits.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this a security issue.  It is expected behavior that a large input file will cause the processing program to use a large amount of memory.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3005
https://nvd.nist.gov/vuln/detail/CVE-2006-3005
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3011">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-26T00:00:00</PublicDate>
    <Bugzilla id="205003" url="https://bugzilla.redhat.com/show_bug.cgi?id=205003" xml:lang="en:us">
CVE-2006-3011 multiple PHP safe mode bypasses (CVE-2006-4481, CVE-2006-2563)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The error_log function in basic_functions.c in PHP before 4.4.4 and 5.x before 5.1.5 allows local users to bypass safe mode and open_basedir restrictions via a &quot;php://&quot; or other scheme in the third argument, which disables safe mode.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3011
https://nvd.nist.gov/vuln/detail/CVE-2006-3011
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3016">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-02T00:00:00</PublicDate>
    <Bugzilla id="1618130" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618130" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in session.c in PHP before 5.1.3 has unknown impact and attack vectors, related to &quot;certain characters in session names,&quot; including special characters that are frequently associated with CRLF injection, SQL injection, cross-site scripting (XSS), and HTTP response splitting vulnerabilities.  NOTE: while the nature of the vulnerability is unspecified, it is likely that this is related to a violation of an expectation by PHP applications that the session name is alphanumeric, as implied in the PHP manual for session_name().
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.2-36.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.9-3.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0736">RHSA-2006:0736</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3016
https://nvd.nist.gov/vuln/detail/CVE-2006-3016
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3017">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-14T00:00:00</PublicDate>
    <Bugzilla id="1618131" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618131" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
zend_hash_del_key_or_index in zend_hash.c in PHP before 4.4.3 and 5.x before 5.1.3 can cause zend_hash_del to delete the wrong element, which prevents a variable from being unset even when the PHP unset function is called, which might cause the variable's value to be used in security-relevant operations.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.2-33.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0568">RHSA-2006:0568</Advisory>
        <Package name="php">php-0:4.3.9-3.15</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0567">RHSA-2006:0567</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0549">RHSA-2006:0549</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3017
https://nvd.nist.gov/vuln/detail/CVE-2006-3017
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3018">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the session extension functionality in PHP before 5.1.3 has unknown impact and attack vectors related to heap corruption.
    </Details>
    <Statement xml:lang="en:us">
Unknown: CVE-2006-3018 has been assigned to an issue in PHP where the cause and fix are unknown, and the impact cannot be verified. The source of the CVE assignment was a single line statement in the PHP 5.1.3 release announcement, http://www.php.net/release_5_1_3.php, reading: &quot;Fixed a heap corruption inside the session extension.&quot;  Of the changes made to the session extension between releases 5.1.2 and 5.1.3, none would fix a bug matching this description by our analysis.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3018
https://nvd.nist.gov/vuln/detail/CVE-2006-3018
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3081">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-14T00:00:00</PublicDate>
    <Bugzilla id="1618132" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618132" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0083">RHSA-2007:0083</Advisory>
        <Package name="mysql">mysql-0:5.0.30-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3081
https://nvd.nist.gov/vuln/detail/CVE-2006-3081
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3082">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-31T00:00:00</PublicDate>
    <Bugzilla id="1618133" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618133" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0571">RHSA-2006:0571</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0571">RHSA-2006:0571</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3082
https://nvd.nist.gov/vuln/detail/CVE-2006-3082
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3083">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-08T00:00:00</PublicDate>
    <Bugzilla id="1618134" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618134" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) krshd and (2) v4rcp applications in (a) MIT Kerberos 5 (krb5) up to 1.5, and 1.4.x before 1.4.4, when running on Linux and AIX, and (b) Heimdal 0.7.2 and earlier, do not check return codes for setuid calls, which allows local users to gain privileges by causing setuid to fail to drop privileges using attacks such as resource exhaustion.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0612">RHSA-2006:0612</Advisory>
        <Package name="krb5">krb5-0:1.3.4-33</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3083
https://nvd.nist.gov/vuln/detail/CVE-2006-3083
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3093">
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Adobe Acrobat Reader (acroread) before 7.0.8 have unknown impact and unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Adobe told us that this issue does not affect the Linux versions of Adobe Acrobat Reader.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3093
https://nvd.nist.gov/vuln/detail/CVE-2006-3093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3113">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618135" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618135" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via simultaneous XPCOM events, which causes a timer object to be deleted in a way that triggers memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3113
https://nvd.nist.gov/vuln/detail/CVE-2006-3113
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3117">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-06-29T00:00:00</PublicDate>
    <Bugzilla id="1618136" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618136" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to execute arbitrary code via a crafted OpenOffice XML document that is not properly handled by (1) Calc, (2) Draw, (3) Impress, (4) Math, or (5) Writer, aka &quot;File Format / Buffer Overflow Vulnerability.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0573">RHSA-2006:0573</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-34.6.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3117
https://nvd.nist.gov/vuln/detail/CVE-2006-3117
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3145">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of NetPBM distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3145
https://nvd.nist.gov/vuln/detail/CVE-2006-3145
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3174">
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via the mailbox parameter.
    </Details>
    <Statement xml:lang="en:us">
This issue has not been able to be reproduced by upstream or after a Red Hat code review.  We therefore do not believe this is a security vulnerability.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3174
https://nvd.nist.gov/vuln/detail/CVE-2006-3174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3242">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-19T00:00:00</PublicDate>
    <Bugzilla id="1618137" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618137" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0577">RHSA-2006:0577</Advisory>
        <Package name="mutt">mutt-5:1.4.1-3.5.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0577">RHSA-2006:0577</Advisory>
        <Package name="mutt">mutt-5:1.4.1-11.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3242
https://nvd.nist.gov/vuln/detail/CVE-2006-3242
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3311">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-12T18:00:00</PublicDate>
    <Bugzilla id="1618138" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618138" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8, Flash MX 2004, and Flex 1.5 allows user-assisted remote attackers to execute arbitrary code via a long, dynamically created string in a SWF movie.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3311
https://nvd.nist.gov/vuln/detail/CVE-2006-3311
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3334">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to &quot;chunk error processing,&quot; possibly involving the &quot;chunk_name&quot;.
    </Details>
    <Statement xml:lang="en:us">
On Red Hat Enterprise Linux 2.1, 3, 4, and 5 this is a two-byte overflow into the middle of the stack and is not exploitable.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3334
https://nvd.nist.gov/vuln/detail/CVE-2006-3334
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3376">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-06-30T00:00:00</PublicDate>
    <Bugzilla id="1618139" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618139" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0597">RHSA-2006:0597</Advisory>
        <Package name="libwmf">libwmf-0:0.2.8.3-5.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3376
https://nvd.nist.gov/vuln/detail/CVE-2006-3376
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3378">
    <Details source="Mitre" xml:lang="en:us">
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
    </Details>
    <Statement xml:lang="en:us">
This issue affects the version of the passwd command from the shadow-utils package.  Red Hat Enterprise Linux 2.1, 3, and 4 are not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3378
https://nvd.nist.gov/vuln/detail/CVE-2006-3378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3403">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-10T00:00:00</PublicDate>
    <Bugzilla id="1618140" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618140" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0591">RHSA-2006:0591</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0591">RHSA-2006:0591</Advisory>
        <Package name="samba">samba-0:3.0.10-1.4E.6.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3403
https://nvd.nist.gov/vuln/detail/CVE-2006-3403
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3404">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-06T00:00:00</PublicDate>
    <Bugzilla id="1618141" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618141" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0598">RHSA-2006:0598</Advisory>
        <Package name="gimp">gimp-1:2.0.5-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3404
https://nvd.nist.gov/vuln/detail/CVE-2006-3404
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3459">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3459
https://nvd.nist.gov/vuln/detail/CVE-2006-3459
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3460">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3460
https://nvd.nist.gov/vuln/detail/CVE-2006-3460
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3461">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3461
https://nvd.nist.gov/vuln/detail/CVE-2006-3461
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3462">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3462
https://nvd.nist.gov/vuln/detail/CVE-2006-3462
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3463">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The EstimateStripByteCounts function in TIFF library (libtiff) before 3.8.2 uses a 16-bit unsigned short when iterating over an unsigned 32-bit value, which allows context-dependent attackers to cause a denial of service via a large td_nstrips value, which triggers an infinite loop.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3463
https://nvd.nist.gov/vuln/detail/CVE-2006-3463
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3464">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving &quot;unchecked arithmetic operations&quot;.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3464
https://nvd.nist.gov/vuln/detail/CVE-2006-3464
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3465">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-01T00:00:00</PublicDate>
    <Bugzilla id="199111" url="https://bugzilla.redhat.com/show_bug.cgi?id=199111" xml:lang="en:us">
Multiple libtiff flaws (CVE-2006-3460 CVE-2006-3461 CVE-2006-3462 CVE-2006-3463 CVE-2006-3464 CVE-2006-3465)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.5.7-25.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0648">RHSA-2006:0648</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.1.3-3.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0603">RHSA-2006:0603</Advisory>
        <Package name="libtiff">libtiff-0:3.6.1-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3465
https://nvd.nist.gov/vuln/detail/CVE-2006-3465
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3467">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-18T00:00:00</PublicDate>
    <Bugzilla id="487070" url="https://bugzilla.redhat.com/show_bug.cgi?id=487070" xml:lang="en:us">
freetype: integer overflow vulnerability due to incomplete fix for CVE-2006-1861
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.4-4.0.rhel3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0635">RHSA-2006:0635</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-111.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0500">RHSA-2006:0500</Advisory>
        <Package name="freetype">freetype-0:2.1.9-1.rhel4.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0634">RHSA-2006:0634</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3467
https://nvd.nist.gov/vuln/detail/CVE-2006-3467
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3468">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618142" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618142" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3468
https://nvd.nist.gov/vuln/detail/CVE-2006-3468
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3469">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-27T00:00:00</PublicDate>
    <Bugzilla id="201904" url="https://bugzilla.redhat.com/show_bug.cgi?id=201904" xml:lang="en:us">
mysql server DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1, 3, or 5, and Red Hat Application Stack v1 and v2.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0768">RHSA-2008:0768</Advisory>
        <Package name="mysql">mysql-0:4.1.22-2.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3469
https://nvd.nist.gov/vuln/detail/CVE-2006-3469
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3486">
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called.  NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon.  Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
    </Details>
    <Statement xml:lang="en:us">
We do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3486
https://nvd.nist.gov/vuln/detail/CVE-2006-3486
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3587">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-12T18:00:00</PublicDate>
    <Bugzilla id="1618143" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618143" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to execute arbitrary commands via a malformed .swf file that results in &quot;multiple improper memory access&quot; errors.
    </Details>
    <Statement xml:lang="en:us">
Adobe gave a statement that these issues do not affect the Linux versions of Macromedia Flash Player.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3587
https://nvd.nist.gov/vuln/detail/CVE-2006-3587
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3588">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-12T18:00:00</PublicDate>
    <Bugzilla id="1618144" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618144" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to cause a denial of service (browser crash) via a malformed, compressed .swf file, a different issue than CVE-2006-3587.
    </Details>
    <Statement xml:lang="en:us">
Adobe gave a statement that these issues do not affect the Linux versions of Macromedia Flash Player.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3588
https://nvd.nist.gov/vuln/detail/CVE-2006-3588
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3619">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-13T00:00:00</PublicDate>
    <Bugzilla id="198912" url="https://bugzilla.redhat.com/show_bug.cgi?id=198912" xml:lang="en:us">
Directory traversal issue in fastjar
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows user-assisted attackers to overwrite arbitrary files via a .jar file containing filenames with &quot;../&quot; sequences.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0473">RHSA-2007:0473</Advisory>
        <Package name="gcc">gcc-0:3.2.3-59</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0220">RHSA-2007:0220</Advisory>
        <Package name="gcc">gcc-0:3.4.6-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3619
https://nvd.nist.gov/vuln/detail/CVE-2006-3619
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3626">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-14T00:00:00</PublicDate>
    <Bugzilla id="1618145" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618145" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
    </Details>
    <Statement xml:lang="en:us">
This vulnerability does not affect Red Hat Enterprise Linux 2.1 or 3 as they are based on 2.4 kernels.

The exploit relies on the kernel supporting the a.out binary format.  Red Hat Enterprise Linux 4, Fedora Core 4, and Fedora Core 5 do not support the a.out binary format, causing the exploit to fail.  We are not currently aware of any way to exploit this vulnerability if a.out binary format is not enabled.  In addition, a default installation of these OS enables SELinux in enforcing mode.  SELinux also completely blocks attempts to exploit this issue.

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198973#c10
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3626
https://nvd.nist.gov/vuln/detail/CVE-2006-3626
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3627">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618146" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618146" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3627
https://nvd.nist.gov/vuln/detail/CVE-2006-3627
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3628">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618147" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618147" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3628
https://nvd.nist.gov/vuln/detail/CVE-2006-3628
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3629">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618148" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618148" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3629
https://nvd.nist.gov/vuln/detail/CVE-2006-3629
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3630">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618149" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618149" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3630
https://nvd.nist.gov/vuln/detail/CVE-2006-3630
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3631">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618150" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618150" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3631
https://nvd.nist.gov/vuln/detail/CVE-2006-3631
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3632">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-17T00:00:00</PublicDate>
    <Bugzilla id="1618151" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618151" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0602">RHSA-2006:0602</Advisory>
        <Package name="wireshark">wireshark-0:0.99.2-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3632
https://nvd.nist.gov/vuln/detail/CVE-2006-3632
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3635">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2008-05-27T00:00:00</PublicDate>
    <Bugzilla id="1483905" url="https://bugzilla.redhat.com/show_bug.cgi?id=1483905" xml:lang="en:us">
kernel: Mishandling of invalid Register Stack Engine (RSE) state causes stack consumption and system crash
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-400</CWE>
    <Details source="Mitre" xml:lang="en:us">
The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-alt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_mrg:2">
        <ProductName>Red Hat Enterprise MRG 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>realtime-kernel</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3635
https://nvd.nist.gov/vuln/detail/CVE-2006-3635
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3636">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-04T00:00:00</PublicDate>
    <Bugzilla id="1618152" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618152" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Barry Warsaw for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0600">RHSA-2006:0600</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-25.rhel3.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0600">RHSA-2006:0600</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3636
https://nvd.nist.gov/vuln/detail/CVE-2006-3636
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3672">
    <Details source="Mitre" xml:lang="en:us">
KDE Konqueror 3.5.1 and earlier allows remote attackers to cause a denial of service (application crash) by calling the replaceChild method on a DOM object, which triggers a null dereference, as demonstrated by calling document.replaceChild with a 0 (zero) argument.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as Konqueror to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3672
https://nvd.nist.gov/vuln/detail/CVE-2006-3672
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3677">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618153" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618153" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3677
https://nvd.nist.gov/vuln/detail/CVE-2006-3677
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3694">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-11T00:00:00</PublicDate>
    <Bugzilla id="1618154" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618154" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass &quot;safe level&quot; checks via unspecified vectors involving (1) the alias function and (2) &quot;directory operations&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0604">RHSA-2006:0604</Advisory>
        <Package name="ruby">ruby-0:1.6.8-9.EL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0604">RHSA-2006:0604</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3694
https://nvd.nist.gov/vuln/detail/CVE-2006-3694
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3731">
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.0.4 and earlier allows remote user-assisted attackers to cause a denial of service (crash) via a form with a multipart/form-data encoding and a user-uploaded file.  NOTE: a third party has claimed that this issue might be related to the LiveHTTPHeaders extension.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a user-assisted crash of a client application such as Firefox to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3731
https://nvd.nist.gov/vuln/detail/CVE-2006-3731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3738">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="430652" url="https://bugzilla.redhat.com/show_bug.cgi?id=430652" xml:lang="en:us">
openssl get_shared_ciphers overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl095a">openssl095a-0:0.9.5a-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096">openssl096-0:0.9.6-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3738
https://nvd.nist.gov/vuln/detail/CVE-2006-3738
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3739">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-12T00:00:00</PublicDate>
    <Bugzilla id="1618155" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618155" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0666">RHSA-2006:0666</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-113.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0665">RHSA-2006:0665</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3739
https://nvd.nist.gov/vuln/detail/CVE-2006-3739
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3740">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-12T00:00:00</PublicDate>
    <Bugzilla id="1618156" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618156" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0666">RHSA-2006:0666</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-113.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0665">RHSA-2006:0665</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3740
https://nvd.nist.gov/vuln/detail/CVE-2006-3740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3741">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-08T00:00:00</PublicDate>
    <Bugzilla id="1618157" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618157" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Stephane Eranian for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3741
https://nvd.nist.gov/vuln/detail/CVE-2006-3741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3742">
    <Details source="Mitre" xml:lang="en:us">
The KDE PAM configuration shipped with Fedora Core 5 causes KDM passwords to be cached, which allows attackers to login without a password by attempting to log in multiple times.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3742
https://nvd.nist.gov/vuln/detail/CVE-2006-3742
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3743">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-22T00:00:00</PublicDate>
    <Bugzilla id="1618158" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618158" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3743
https://nvd.nist.gov/vuln/detail/CVE-2006-3743
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3744">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-22T00:00:00</PublicDate>
    <Bugzilla id="1618159" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618159" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun Rasterfile (bitmap) images that trigger heap-based buffer overflows.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3744
https://nvd.nist.gov/vuln/detail/CVE-2006-3744
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3745">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-22T00:00:00</PublicDate>
    <Bugzilla id="1618160" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618160" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the sctp_make_abort_user function in the SCTP implementation in Linux 2.6.x before 2.6.17.10 and 2.4.23 up to 2.4.33 allows local users to cause a denial of service (panic) and possibly gain root privileges via unknown attack vectors.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Wei Wang (McAfee Avert Labs) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0617">RHSA-2006:0617</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3745
https://nvd.nist.gov/vuln/detail/CVE-2006-3745
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3746">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-21T00:00:00</PublicDate>
    <Bugzilla id="200502" url="https://bugzilla.redhat.com/show_bug.cgi?id=200502" xml:lang="en:us">
GnuPG Parse_Comment Remote Buffer Overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0615">RHSA-2006:0615</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0615">RHSA-2006:0615</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3746
https://nvd.nist.gov/vuln/detail/CVE-2006-3746
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3747">
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
    </Details>
    <Statement xml:lang="en:us">
The ability to exploit this issue is dependent on the stack layout for a particular compiled version of mod_rewrite. If the compiler has added padding to the stack immediately after the buffer being overwritten, this issue can not be exploited, and Apache httpd will continue operating normally.

The Red Hat Security Response Team analyzed Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4 binaries for all architectures as shipped by Red Hat and determined that these versions cannot be exploited.  This issue does not affect the version of Apache httpd as supplied with Red Hat Enterprise Linux 2.1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3747
https://nvd.nist.gov/vuln/detail/CVE-2006-3747
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3801">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618161" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618161" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 does not properly clear a JavaScript reference to a frame or window, which leaves a pointer to a deleted object that allows remote attackers to execute arbitrary native code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3801
https://nvd.nist.gov/vuln/detail/CVE-2006-3801
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3802">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618162" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618162" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3802
https://nvd.nist.gov/vuln/detail/CVE-2006-3802
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3803">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618163" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618163" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3803
https://nvd.nist.gov/vuln/detail/CVE-2006-3803
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3804">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618164" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618164" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Mozilla Thunderbird before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to cause a denial of service (crash) via a VCard attachment with a malformed base64 field, which copies more data than expected due to an integer underflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3804
https://nvd.nist.gov/vuln/detail/CVE-2006-3804
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3805">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618165" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618165" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3805
https://nvd.nist.gov/vuln/detail/CVE-2006-3805
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3806">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618166" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618166" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified &quot;string function arguments.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3806
https://nvd.nist.gov/vuln/detail/CVE-2006-3806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3807">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618167" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618167" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling &quot;named JavaScript functions&quot; that use the constructor.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3807
https://nvd.nist.gov/vuln/detail/CVE-2006-3807
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3808">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618168" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618168" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote Proxy AutoConfig (PAC) servers to execute code with elevated privileges via a PAC script that sets the FindProxyForURL function to an eval method on a privileged object.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3808
https://nvd.nist.gov/vuln/detail/CVE-2006-3808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3809">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618169" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618169" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows scripts with the UniversalBrowserRead privilege to gain UniversalXPConnect privileges and possibly execute code or obtain sensitive data by reading into a privileged context.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3809
https://nvd.nist.gov/vuln/detail/CVE-2006-3809
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3810">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618170" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618170" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the XPCNativeWrapper(window).Function construct.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3810
https://nvd.nist.gov/vuln/detail/CVE-2006-3810
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3811">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="1618171" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618171" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) &quot;anonymous box selectors outside of UA stylesheets,&quot; (5) stale references to &quot;removed nodes,&quot; and (6) running the crypto.generateCRMFRequest callback on deleted context.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0611">RHSA-2006:0611</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3811
https://nvd.nist.gov/vuln/detail/CVE-2006-3811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3812">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-07-26T00:00:00</PublicDate>
    <Bugzilla id="200455" url="https://bugzilla.redhat.com/show_bug.cgi?id=200455" xml:lang="en:us">
vulnerabilities: CVE-2006-{3113,3677,3801-3812}
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to reference remote files and possibly load chrome: URLs by tricking the user into copying or dragging links.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0608">RHSA-2006:0608</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0609">RHSA-2006:0609</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.3-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-07-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0610">RHSA-2006:0610</Advisory>
        <Package name="firefox">firefox-0:1.5.0.5-0.el4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0594">RHSA-2006:0594</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3812
https://nvd.nist.gov/vuln/detail/CVE-2006-3812
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3813">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-10T00:00:00</PublicDate>
    <Bugzilla id="1618172" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618172" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0605">RHSA-2006:0605</Advisory>
        <Package name="perl">perl-3:5.8.5-36.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3813
https://nvd.nist.gov/vuln/detail/CVE-2006-3813
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3835">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-21T00:00:00</PublicDate>
    <Bugzilla id="237084" url="https://bugzilla.redhat.com/show_bug.cgi?id=237084" xml:lang="en:us">
tomcat directory listing issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
    </Details>
    <Statement xml:lang="en:us">
This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.

Details on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3835
https://nvd.nist.gov/vuln/detail/CVE-2006-3835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3879">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the loadChunk function in loaders/load_gt2.c in libmikmod in Mikmod Sound System 3.2.2 allows remote attackers to cause a denial of service via a GRAOUMF TRACKER (GT2) module file with a large (0xffffffff) comment length value in an XCOM chunk.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect versions of Mikmod 3.2.0-beta2 or prior.  Versions of Mikmod distributed with Red Hat Enterprise Linux 2.1, 3, and 4 are based on version 3.1.11 and are therefore not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3879
https://nvd.nist.gov/vuln/detail/CVE-2006-3879
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-3918">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-08T00:00:00</PublicDate>
    <Bugzilla id="200732" url="https://bugzilla.redhat.com/show_bug.cgi?id=200732" xml:lang="en:us">
httpd: Expect header XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0619">RHSA-2006:0619</Advisory>
        <Package name="httpd">httpd-0:2.0.46-61.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0619">RHSA-2006:0619</Advisory>
        <Package name="httpd">httpd-0:2.0.52-28.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0618">RHSA-2006:0618</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0618">RHSA-2006:0618</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0618">RHSA-2006:0618</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0618">RHSA-2006:0618</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0692">RHSA-2006:0692</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-3918
https://nvd.nist.gov/vuln/detail/CVE-2006-3918
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4019">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-11T00:00:00</PublicDate>
    <Bugzilla id="1618173" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618173" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Dynamic variable evaluation vulnerability in compose.php in SquirrelMail 1.4.0 to 1.4.7 allows remote attackers to overwrite arbitrary program variables and read or write the attachments and preferences of other users.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0668">RHSA-2006:0668</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0668">RHSA-2006:0668</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-2.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4019
https://nvd.nist.gov/vuln/detail/CVE-2006-4019
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4020">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-04T00:00:00</PublicDate>
    <Bugzilla id="1618174" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618174" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.2-36.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.9-3.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0736">RHSA-2006:0736</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4020
https://nvd.nist.gov/vuln/detail/CVE-2006-4020
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4023">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-29T00:00:00</PublicDate>
    <Bugzilla id="920517" url="https://bugzilla.redhat.com/show_bug.cgi?id=920517" xml:lang="en:us">
php: Improper validation of strings in ip2long function (remote attackers able to obtain network information and facilitate other attacks)
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-20</CWE>
    <Details source="Mitre" xml:lang="en:us">
The ip2long function in PHP 5.1.4 and earlier may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote attackers to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0.  NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>php</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>php53</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>php</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4023
https://nvd.nist.gov/vuln/detail/CVE-2006-4023
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4031">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-11-23T00:00:00</PublicDate>
    <Bugzilla id="202246" url="https://bugzilla.redhat.com/show_bug.cgi?id=202246" xml:lang="en:us">
MySQL improper permission revocation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0768">RHSA-2008:0768</Advisory>
        <Package name="mysql">mysql-0:4.1.22-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0083">RHSA-2007:0083</Advisory>
        <Package name="mysql">mysql-0:5.0.30-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4031
https://nvd.nist.gov/vuln/detail/CVE-2006-4031
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4093">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-17T00:00:00</PublicDate>
    <Bugzilla id="1618175" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618175" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the &quot;HID0 attention enable on PPC970 at boot time.&quot;
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Olof Johansson for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4093
https://nvd.nist.gov/vuln/detail/CVE-2006-4093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4095">
    <Details source="Mitre" xml:lang="en:us">
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  The version of BIND that ships with Red Hat Enterprise Linux is not vulnerable to this issue as it does not handle signed RR records.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4095
https://nvd.nist.gov/vuln/detail/CVE-2006-4095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4096">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-05T00:00:00</PublicDate>
    <Bugzilla id="494543" url="https://bugzilla.redhat.com/show_bug.cgi?id=494543" xml:lang="en:us">
INSIST failure in ISC BIND recursive query
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood of recursive queries, which cause an INSIST failure when the response is received after the recursion queue is empty.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect Red Hat Enterprise Linux 2.1
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Desktop version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0287">RHBA-2006:0287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux AS version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0287">RHBA-2006:0287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux AS version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0288">RHBA-2006:0288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux Desktop version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0288">RHBA-2006:0288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux ES version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0287">RHBA-2006:0287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux ES version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0288">RHBA-2006:0288</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux WS version 3</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0287">RHBA-2006:0287</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux WS version 4</ProductName>
        <ReleaseDate>2006-08-09T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2006:0288">RHBA-2006:0288</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4096
https://nvd.nist.gov/vuln/detail/CVE-2006-4096
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4124">
    <Details source="Mitre" xml:lang="en:us">
The libXm library in LessTif 0.95.0 and earlier allows local users to gain privileges via the DEBUG_FILE environment variable, which is used to create world-writable files when libXm is run from a setuid program.
    </Details>
    <Statement xml:lang="en:us">
LessTif is shipped with Red Hat Enterprise Linux 2.1 but not 3 or 4.  On Enterprise Linux 2.1 we build LessTif with debugging disabled, so the DEBUG_FILE environment variable is ignored and this issue cannot be exploited.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4124
https://nvd.nist.gov/vuln/detail/CVE-2006-4124
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4144">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-14T00:00:00</PublicDate>
    <Bugzilla id="1618176" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618176" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large (1) bytes_per_pixel, (2) columns, and (3) rows values, which trigger a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-08-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0633">RHSA-2006:0633</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4144
https://nvd.nist.gov/vuln/detail/CVE-2006-4144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4145">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-16T00:00:00</PublicDate>
    <Bugzilla id="306911" url="https://bugzilla.redhat.com/show_bug.cgi?id=306911" xml:lang="en:us">
UDF truncating issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Universal Disk Format (UDF) filesystem driver in Linux kernel 2.6.17 and earlier allows local users to cause a denial of service (hang and crash) via certain operations involving truncated files, as demonstrated via the dd command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0665">RHSA-2008:0665</Advisory>
        <Package name="kernel">kernel-0:2.6.9-78.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4145
https://nvd.nist.gov/vuln/detail/CVE-2006-4145
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4146">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-31T00:00:00</PublicDate>
    <Bugzilla id="203875" url="https://bugzilla.redhat.com/show_bug.cgi?id=203875" xml:lang="en:us">
GDB buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the (1) DWARF (dwarfread.c) and (2) DWARF2 (dwarf2read.c) debugging code in GNU Debugger (GDB) 6.5 allows user-assisted attackers, or restricted users, to execute arbitrary code via a crafted file with a location block (DW_FORM_block) that contains a large number of operations.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 was not vulnerable to this issue as it contained a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0469">RHSA-2007:0469</Advisory>
        <Package name="gdb">gdb-0:6.3.0.0-1.138.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0229">RHSA-2007:0229</Advisory>
        <Package name="gdb">gdb-0:6.3.0.0-1.143.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4146
https://nvd.nist.gov/vuln/detail/CVE-2006-4146
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4168">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-13T00:00:00</PublicDate>
    <Bugzilla id="243888" url="https://bugzilla.redhat.com/show_bug.cgi?id=243888" xml:lang="en:us">
libexif integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the exif_data_load_data_entry function in libexif/exif-data.c in Libexif before 0.6.16 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via an image with many EXIF components, which triggers a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0501">RHSA-2007:0501</Advisory>
        <Package name="libexif">libexif-0:0.5.12-5.1.0.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0501">RHSA-2007:0501</Advisory>
        <Package name="libexif">libexif-0:0.6.13-4.0.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4168
https://nvd.nist.gov/vuln/detail/CVE-2006-4168
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4181">
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the sqllog function in the SQL accounting code for radiusd in GNU Radius 1.2 and 1.3 allows remote attackers to execute arbitrary code via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  Red Hat does not ship GNU Radius in Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4181
https://nvd.nist.gov/vuln/detail/CVE-2006-4181
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4192">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-06T00:00:00</PublicDate>
    <Bugzilla id="497154" url="https://bugzilla.redhat.com/show_bug.cgi?id=497154" xml:lang="en:us">
libmodplug: Integer overflow when reading samples of AMF files
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.1</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-190-&gt;CWE-122</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in MODPlug Tracker (OpenMPT) 1.17.02.43 and earlier and libmodplug 0.8 and earlier, as used in GStreamer and possibly other products, allow user-assisted remote attackers to execute arbitrary code via (1) long strings in ITP files used by the CSoundFile::ReadITProject function in soundlib/Load_it.cpp and (2) crafted modules used by the CSoundFile::ReadSample function in soundlib/Sndfile.cpp, as demonstrated by crafted AMF files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2011-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2011:0477">RHSA-2011:0477</Advisory>
        <Package name="gstreamer-plugins">gstreamer-plugins-0:0.8.5-1.EL.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4192
https://nvd.nist.gov/vuln/detail/CVE-2006-4192
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4226">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-22T00:00:00</PublicDate>
    <Bugzilla id="203428" url="https://bugzilla.redhat.com/show_bug.cgi?id=203428" xml:lang="en:us">
mysql-server create database privilege escalation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect Red Hat Enterprise Linux 2.1 or 3
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0152">RHSA-2007:0152</Advisory>
        <Package name="mysql">mysql-0:4.1.20-2.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0083">RHSA-2007:0083</Advisory>
        <Package name="mysql">mysql-0:5.0.30-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4226
https://nvd.nist.gov/vuln/detail/CVE-2006-4226
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4227">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-29T00:00:00</PublicDate>
    <Bugzilla id="216427" url="https://bugzilla.redhat.com/show_bug.cgi?id=216427" xml:lang="en:us">
mysql improper suid argument evaluation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0083">RHSA-2007:0083</Advisory>
        <Package name="mysql">mysql-0:5.0.30-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4227
https://nvd.nist.gov/vuln/detail/CVE-2006-4227
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4253">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-12T00:00:00</PublicDate>
    <Bugzilla id="1618177" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618177" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3.  NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie.  Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability.  NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4253
https://nvd.nist.gov/vuln/detail/CVE-2006-4253
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4262">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-20T00:00:00</PublicDate>
    <Bugzilla id="203645" url="https://bugzilla.redhat.com/show_bug.cgi?id=203645" xml:lang="en:us">
cscope: multiple buffer overflows
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>3.7</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in cscope 15.5 and earlier allow user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple vectors including (1) a long pathname that is not properly handled during file list parsing, (2) long pathnames that result from path variable expansion such as tilde expansion for the HOME environment variable, and (3) a long -f (aka reffile) command line argument.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 was not vulnerable to this issue as it contained a backported patch since its first release.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-06-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1101">RHSA-2009:1101</Advisory>
        <Package name="cscope">cscope-0:15.5-16.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-06-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1101">RHSA-2009:1101</Advisory>
        <Package name="cscope">cscope-0:15.5-10.RHEL4.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4262
https://nvd.nist.gov/vuln/detail/CVE-2006-4262
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4310">
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FTP response, when attempting to connect with a username and password via the FTP URI.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw a security issue.  This flaw is the result of a NULL pointer dereference, which is not exploitable and can only cause a client crash.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4310
https://nvd.nist.gov/vuln/detail/CVE-2006-4310
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4330">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-23T00:00:00</PublicDate>
    <Bugzilla id="1618178" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618178" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the SCSI dissector in Wireshark (formerly Ethereal) 0.99.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4330
https://nvd.nist.gov/vuln/detail/CVE-2006-4330
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4331">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-23T00:00:00</PublicDate>
    <Bugzilla id="1618179" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618179" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one errors in the IPSec ESP preference parser in Wireshark (formerly Ethereal) 0.99.2 allow remote attackers to cause a denial of service (crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4331
https://nvd.nist.gov/vuln/detail/CVE-2006-4331
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4333">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-23T00:00:00</PublicDate>
    <Bugzilla id="1618180" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618180" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL3.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0658">RHSA-2006:0658</Advisory>
        <Package name="wireshark">wireshark-0:0.99.3-EL4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4333
https://nvd.nist.gov/vuln/detail/CVE-2006-4333
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4334">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-19T00:00:00</PublicDate>
    <Bugzilla id="1618181" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618181" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-13.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-16.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4334
https://nvd.nist.gov/vuln/detail/CVE-2006-4334
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4335">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-02T00:00:00</PublicDate>
    <Bugzilla id="220595" url="https://bugzilla.redhat.com/show_bug.cgi?id=220595" xml:lang="en:us">
multiple vulnerabilities in lha
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a &quot;stack modification vulnerability.&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in lha for Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-13.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-16.rhel4</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>lha</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4335
https://nvd.nist.gov/vuln/detail/CVE-2006-4335
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4336">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-02T00:00:00</PublicDate>
    <Bugzilla id="220595" url="https://bugzilla.redhat.com/show_bug.cgi?id=220595" xml:lang="en:us">
multiple vulnerabilities in lha
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in lha for Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-13.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-16.rhel4</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>lha</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4336
https://nvd.nist.gov/vuln/detail/CVE-2006-4336
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4337">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-02T00:00:00</PublicDate>
    <Bugzilla id="220595" url="https://bugzilla.redhat.com/show_bug.cgi?id=220595" xml:lang="en:us">
multiple vulnerabilities in lha
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in lha for Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-13.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-16.rhel4</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>lha</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4337
https://nvd.nist.gov/vuln/detail/CVE-2006-4337
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4338">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-19T00:00:00</PublicDate>
    <Bugzilla id="1618182" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618182" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=220595

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-13.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0667">RHSA-2006:0667</Advisory>
        <Package name="gzip">gzip-0:1.3.3-16.rhel4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4338
https://nvd.nist.gov/vuln/detail/CVE-2006-4338
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4339">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-05T17:00:00</PublicDate>
    <CVSS3 status="draft">
        <CVSS3BaseScore>9.1</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-347</CWE>
    <Details source="Mitre" xml:lang="en:us">
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in OpenSSL. When configured to use an RSA key with exponent 3, OpenSSL improperly removes PKCS-1 padding before generating a hash. This allows remote attackers to forge PKCS #1 v1.5 signatures. Consequently, OpenSSL may incorrectly verify X.509 and other certificates, leading to a bypass of trust and authentication mechanisms.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
    </Mitigation>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>edk2</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim-unsigned-aarch64</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:10">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim-unsigned-x64</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>ovmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-openssl10</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>edk2</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>mingw-openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim-unsigned-x64</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>compat-openssl11</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>edk2</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim-unsigned-aarch64</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>shim-unsigned-x64</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>Red Hat JBoss Core Services</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:openshift:4">
        <ProductName>Red Hat OpenShift Container Platform 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>rhcos</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4339
https://nvd.nist.gov/vuln/detail/CVE-2006-4339
http://dev2dev.bea.com/pub/advisory/238
http://docs.info.apple.com/article.html?artnum=304829
http://docs.info.apple.com/article.html?artnum=307177
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&amp;cc=us&amp;objectID=c01070495
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540
http://jvn.jp/en/jp/JVN51615542/index.html
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://lists.vmware.com/pipermail/security-announce/2008/000008.html
http://marc.info/?l=bind-announce&amp;m=116253119512445&amp;w=2
http://marc.info/?l=bugtraq&amp;m=130497311408250&amp;w=2
http://openvpn.net/changelog.html
http://secunia.com/advisories/21709
http://secunia.com/advisories/21767
http://secunia.com/advisories/21776
http://secunia.com/advisories/21778
http://secunia.com/advisories/21785
http://secunia.com/advisories/21791
http://secunia.com/advisories/21812
http://secunia.com/advisories/21823
http://secunia.com/advisories/21846
http://secunia.com/advisories/21852
http://secunia.com/advisories/21870
http://secunia.com/advisories/21873
http://secunia.com/advisories/21906
http://secunia.com/advisories/21927
http://secunia.com/advisories/21930
http://secunia.com/advisories/21982
http://secunia.com/advisories/22036
http://secunia.com/advisories/22044
http://secunia.com/advisories/22066
http://secunia.com/advisories/22161
http://secunia.com/advisories/22226
http://secunia.com/advisories/22232
http://secunia.com/advisories/22259
http://secunia.com/advisories/22260
http://secunia.com/advisories/22284
http://secunia.com/advisories/22325
http://secunia.com/advisories/22446
http://secunia.com/advisories/22509
http://secunia.com/advisories/22513
http://secunia.com/advisories/22523
http://secunia.com/advisories/22545
http://secunia.com/advisories/22585
http://secunia.com/advisories/22671
http://secunia.com/advisories/22689
http://secunia.com/advisories/22711
http://secunia.com/advisories/22733
http://secunia.com/advisories/22758
http://secunia.com/advisories/22799
http://secunia.com/advisories/22932
http://secunia.com/advisories/22934
http://secunia.com/advisories/22936
http://secunia.com/advisories/22937
http://secunia.com/advisories/22938
http://secunia.com/advisories/22939
http://secunia.com/advisories/22940
http://secunia.com/advisories/22948
http://secunia.com/advisories/22949
http://secunia.com/advisories/23155
http://secunia.com/advisories/23455
http://secunia.com/advisories/23680
http://secunia.com/advisories/23794
http://secunia.com/advisories/23841
http://secunia.com/advisories/23915
http://secunia.com/advisories/24099
http://secunia.com/advisories/24930
http://secunia.com/advisories/24950
http://secunia.com/advisories/25284
http://secunia.com/advisories/25399
http://secunia.com/advisories/25649
http://secunia.com/advisories/26329
http://secunia.com/advisories/26893
http://secunia.com/advisories/28115
http://secunia.com/advisories/31492
http://secunia.com/advisories/38567
http://secunia.com/advisories/38568
http://secunia.com/advisories/41818
http://secunia.com/advisories/60799
http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc
http://security.gentoo.org/glsa/glsa-200609-05.xml
http://security.gentoo.org/glsa/glsa-200609-18.xml
http://securitytracker.com/id?1016791
http://securitytracker.com/id?1017522
http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.566955
http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2006&amp;m=slackware-security.605306
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1
http://support.attachmate.com/techdocs/2127.html
http://support.attachmate.com/techdocs/2128.html
http://support.attachmate.com/techdocs/2137.html
http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm
http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf
http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html
http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html
http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml
http://www.debian.org/security/2006/dsa-1174
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
http://www.kb.cert.org/vuls/id/845620
http://www.mandriva.com/security/advisories?name=MDKSA-2006:161
http://www.mandriva.com/security/advisories?name=MDKSA-2006:177
http://www.mandriva.com/security/advisories?name=MDKSA-2006:178
http://www.mandriva.com/security/advisories?name=MDKSA-2006:207
http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/
http://www.novell.com/linux/security/advisories/2006_26_sr.html
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
http://www.novell.com/linux/security/advisories/2006_61_opera.html
http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
http://www.openbsd.org/errata.html
http://www.openoffice.org/security/cves/CVE-2006-4339.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html
http://www.openssl.org/news/secadv_20060905.txt
http://www.opera.com/support/search/supsearch.dml?index=845
http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html
http://www.osvdb.org/28549
http://www.redhat.com/support/errata/RHSA-2006-0661.html
http://www.redhat.com/support/errata/RHSA-2007-0062.html
http://www.redhat.com/support/errata/RHSA-2007-0072.html
http://www.redhat.com/support/errata/RHSA-2007-0073.html
http://www.redhat.com/support/errata/RHSA-2008-0629.html
http://www.securityfocus.com/archive/1/445231/100/0/threaded
http://www.securityfocus.com/archive/1/445822/100/0/threaded
http://www.securityfocus.com/archive/1/450327/100/0/threaded
http://www.securityfocus.com/archive/1/456546/100/200/threaded
http://www.securityfocus.com/archive/1/489739/100/0/threaded
http://www.securityfocus.com/bid/19849
http://www.securityfocus.com/bid/22083
http://www.securityfocus.com/bid/28276
http://www.serv-u.com/releasenotes/
http://www.sybase.com/detail?id=1047991
http://www.ubuntu.com/usn/usn-339-1
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
http://www.us.debian.org/security/2006/dsa-1173
http://www.vmware.com/security/advisories/VMSA-2008-0005.html
http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html
http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html
http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html
http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html
http://www.vmware.com/support/player/doc/releasenotes_player.html
http://www.vmware.com/support/player2/doc/releasenotes_player2.html
http://www.vmware.com/support/server/doc/releasenotes_server.html
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
http://www.vupen.com/english/advisories/2006/3453
http://www.vupen.com/english/advisories/2006/3566
http://www.vupen.com/english/advisories/2006/3730
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/3793
http://www.vupen.com/english/advisories/2006/3899
http://www.vupen.com/english/advisories/2006/3936
http://www.vupen.com/english/advisories/2006/4205
http://www.vupen.com/english/advisories/2006/4206
http://www.vupen.com/english/advisories/2006/4207
http://www.vupen.com/english/advisories/2006/4216
http://www.vupen.com/english/advisories/2006/4327
http://www.vupen.com/english/advisories/2006/4329
http://www.vupen.com/english/advisories/2006/4366
http://www.vupen.com/english/advisories/2006/4417
http://www.vupen.com/english/advisories/2006/4586
http://www.vupen.com/english/advisories/2006/4744
http://www.vupen.com/english/advisories/2006/4750
http://www.vupen.com/english/advisories/2006/5146
http://www.vupen.com/english/advisories/2007/0254
http://www.vupen.com/english/advisories/2007/0343
http://www.vupen.com/english/advisories/2007/1401
http://www.vupen.com/english/advisories/2007/1815
http://www.vupen.com/english/advisories/2007/1945
http://www.vupen.com/english/advisories/2007/2163
http://www.vupen.com/english/advisories/2007/2315
http://www.vupen.com/english/advisories/2007/2783
http://www.vupen.com/english/advisories/2007/4224
http://www.vupen.com/english/advisories/2008/0905/references
http://www.vupen.com/english/advisories/2010/0366
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=3117
https://exchange.xforce.ibmcloud.com/vulnerabilities/28755
https://issues.rpath.com/browse/RPL-1633
https://issues.rpath.com/browse/RPL-616
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656
https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html
https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4340">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618183" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618183" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339.  NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4340
https://nvd.nist.gov/vuln/detail/CVE-2006-4340
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4342">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-10-13T00:00:00</PublicDate>
    <Bugzilla id="1618184" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618184" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4342
https://nvd.nist.gov/vuln/detail/CVE-2006-4342
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4343">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="430651" url="https://bugzilla.redhat.com/show_bug.cgi?id=430651" xml:lang="en:us">
openssl sslv2 client code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl095a">openssl095a-0:0.9.5a-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096">openssl096-0:0.9.6-32</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-16.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0695">RHSA-2006:0695</Advisory>
        <Package name="openssl096b">openssl096b-0:0.9.6b-22.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4343
https://nvd.nist.gov/vuln/detail/CVE-2006-4343
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4380">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2005-05-28T00:00:00</PublicDate>
    <Bugzilla id="1618185" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618185" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-06-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0544">RHSA-2006:0544</Advisory>
        <Package name="mysql">mysql-0:4.1.20-1.RHEL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4380
https://nvd.nist.gov/vuln/detail/CVE-2006-4380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4433">
    <Details source="Mitre" xml:lang="en:us">
PHP before 4.4.3 and 5.x before 5.1.4 does not limit the character set of the session identifier (PHPSESSID) for third party session handlers, which might make it easier for remote attackers to exploit other vulnerabilities by inserting PHP code into the PHPSESSID, which is stored in the session file.  NOTE: it could be argued that this not a vulnerability in PHP itself, rather a design limitation that enables certain attacks against session handlers that do not account for this limitation.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a PHP flaw.  The problem is caused by the insufficient input validation performed by Zend platform.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4433
https://nvd.nist.gov/vuln/detail/CVE-2006-4433
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4434">
    <Details source="Mitre" xml:lang="en:us">
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long &quot;header line&quot;, which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying &quot;The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.&quot;
    </Details>
    <Statement xml:lang="en:us">
This flaw causes a crash but does not result in a denial of service against Sendmail and is therefore not a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4434
https://nvd.nist.gov/vuln/detail/CVE-2006-4434
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4447">
    <Details source="Mitre" xml:lang="en:us">
X.Org and XFree86, including libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm, does not check the return values for setuid and seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail, such as by exceeding a ulimit.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable. This issue does not exist in Red Hat Enterprise Linux 2.1 or 3.  This issue not exploitable in Red Hat Enterprise Linux 4.  A detailed analysis of this issue can be found in the Red Hat Bug Tracking System:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195555
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4447
https://nvd.nist.gov/vuln/detail/CVE-2006-4447
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4481">
    <Details source="Mitre" xml:lang="en:us">
The (1) file_exists and (2) imap_reopen functions in PHP before 5.1.5 do not check for the safe_mode and open_basedir settings, which allows local users to bypass the settings.  NOTE: the error_log function is covered by CVE-2006-3011, and the imap_open function is covered by CVE-2006-1017.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4481
https://nvd.nist.gov/vuln/detail/CVE-2006-4481
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4482">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-17T00:00:00</PublicDate>
    <Bugzilla id="1618186" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618186" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.2-36.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.9-3.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4482
https://nvd.nist.gov/vuln/detail/CVE-2006-4482
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4484">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-07-16T00:00:00</PublicDate>
    <Bugzilla id="431568" url="https://bugzilla.redhat.com/show_bug.cgi?id=431568" xml:lang="en:us">
gd: GIF handling buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.2-36.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.9-3.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4484
https://nvd.nist.gov/vuln/detail/CVE-2006-4484
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4485">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-17T00:00:00</PublicDate>
    <Bugzilla id="1618187" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618187" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The stripos function in PHP before 5.1.5 has unknown impact and attack vectors related to an out-of-bounds read.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4485
https://nvd.nist.gov/vuln/detail/CVE-2006-4485
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4486">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-18T00:00:00</PublicDate>
    <Bugzilla id="1618188" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618188" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in memory allocation routines in PHP before 5.1.6, when running on a 64-bit system, allows context-dependent attackers to bypass the memory_limit restriction.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.2-36.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0669">RHSA-2006:0669</Advisory>
        <Package name="php">php-0:4.3.9-3.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux AS (Advanced Server) version 2.1 </ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux ES version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux WS version 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Linux Advanced Workstation 2.1</ProductName>
        <ReleaseDate>2006-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0682">RHSA-2006:0682</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4486
https://nvd.nist.gov/vuln/detail/CVE-2006-4486
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4513">
    <Bugzilla id="212696" url="https://bugzilla.redhat.com/show_bug.cgi?id=212696" xml:lang="en:us">
CVE-2006-4513: multiple integer overflows in wv &lt; 1.2.3
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the WV library in wvWare (formerly mswordview) before 1.2.3, as used by AbiWord, KWord, and possibly other products, allow user-assisted remote attackers to execute arbitrary code via a crafted Microsoft Word (DOC) file that produces (1) large LFO clfolvl values in the wvGetLFO_records function or (2) a large LFO nolfo value in the wvGetFLO_PLF function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect versions of wvWare library included in koffice packages as shipped with Red Hat Enterprise Linux 2.1
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4513
https://nvd.nist.gov/vuln/detail/CVE-2006-4513
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4514">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-30T00:00:00</PublicDate>
    <Bugzilla id="1618189" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618189" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0011">RHSA-2007:0011</Advisory>
        <Package name="libgsf">libgsf-0:1.6.0-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0011">RHSA-2007:0011</Advisory>
        <Package name="libgsf">libgsf-0:1.10.1-2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4514
https://nvd.nist.gov/vuln/detail/CVE-2006-4514
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4519">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-09T00:00:00</PublicDate>
    <Bugzilla id="247565" url="https://bugzilla.redhat.com/show_bug.cgi?id=247565" xml:lang="en:us">
GIMP multiple image loader integer overflows
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the image loader plug-ins in GIMP before 2.2.16 allow user-assisted remote attackers to execute arbitrary code via crafted length values in (1) DICOM, (2) PNM, (3) PSD, (4) PSP, (5) Sun RAS, (6) XBM, and (7) XWD files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.1-7.8.el2_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.3-20.9.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:2.0.5-7.0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-2:2.2.13-2.0.7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4519
https://nvd.nist.gov/vuln/detail/CVE-2006-4519
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4535">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-28T00:00:00</PublicDate>
    <Bugzilla id="1618190" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618190" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745.  NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4535
https://nvd.nist.gov/vuln/detail/CVE-2006-4535
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4538">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-23T00:00:00</PublicDate>
    <Bugzilla id="289151" url="https://bugzilla.redhat.com/show_bug.cgi?id=289151" xml:lang="en:us">
kernel: Local DoS with corrupted ELF
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0787">RHSA-2008:0787</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.67</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1049">RHSA-2007:1049</Advisory>
        <Package name="kernel">kernel-0:2.4.21-53.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4538
https://nvd.nist.gov/vuln/detail/CVE-2006-4538
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4565">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618191" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618191" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a &quot;minimal quantifier.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4565
https://nvd.nist.gov/vuln/detail/CVE-2006-4565
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4566">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618192" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618192" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) via a malformed JavaScript regular expression that ends with a backslash in an unterminated character set (&quot;[\\&quot;), which leads to a buffer over-read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4566
https://nvd.nist.gov/vuln/detail/CVE-2006-4566
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4567">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618193" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618193" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4567
https://nvd.nist.gov/vuln/detail/CVE-2006-4567
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4568">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618194" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618194" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4568
https://nvd.nist.gov/vuln/detail/CVE-2006-4568
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4569">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-15T00:00:00</PublicDate>
    <Bugzilla id="1618195" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618195" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The popup blocker in Mozilla Firefox before 1.5.0.7 opens the &quot;blocked popups&quot; display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4569
https://nvd.nist.gov/vuln/detail/CVE-2006-4569
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4570">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="1618196" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618196" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with &quot;Load Images&quot; enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4570
https://nvd.nist.gov/vuln/detail/CVE-2006-4570
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4571">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-15T00:01:00</PublicDate>
    <Bugzilla id="209167" url="https://bugzilla.redhat.com/show_bug.cgi?id=209167" xml:lang="en:us">
seamonkey &lt; 1.0.5 multiple vulnerabilities; to replace Mozilla
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0675">RHSA-2006:0675</Advisory>
        <Package name="firefox">firefox-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0676">RHSA-2006:0676</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.5-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0677">RHSA-2006:0677</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.7-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4571
https://nvd.nist.gov/vuln/detail/CVE-2006-4571
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4572">
    <Details source="Mitre" xml:lang="en:us">
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka &quot;ip6_tables protocol bypass bug;&quot; and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka &quot;ip6_tables extension header bypass bug.&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4572
https://nvd.nist.gov/vuln/detail/CVE-2006-4572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4573">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-23T00:00:00</PublicDate>
    <Bugzilla id="212056" url="https://bugzilla.redhat.com/show_bug.cgi?id=212056" xml:lang="en:us">
screen buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the &quot;utf8 combining characters handling&quot; (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences.
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in Red Hat Enterprise Linux 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>screen</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>screen</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>screen</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4573
https://nvd.nist.gov/vuln/detail/CVE-2006-4573
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4574">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-30T00:00:00</PublicDate>
    <Bugzilla id="1618197" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618197" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4574
https://nvd.nist.gov/vuln/detail/CVE-2006-4574
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4600">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-04T00:00:00</PublicDate>
    <Bugzilla id="1618198" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618198" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0430">RHSA-2007:0430</Advisory>
        <Package name="openldap">openldap-0:2.0.27-23</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0310">RHSA-2007:0310</Advisory>
        <Package name="openldap">openldap-0:2.2.13-7.4E</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4600
https://nvd.nist.gov/vuln/detail/CVE-2006-4600
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4623">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-21T00:00:00</PublicDate>
    <Bugzilla id="1618199" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618199" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204912

This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4623
https://nvd.nist.gov/vuln/detail/CVE-2006-4623
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4624">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-06-23T00:00:00</PublicDate>
    <Bugzilla id="205651" url="https://bugzilla.redhat.com/show_bug.cgi?id=205651" xml:lang="en:us">
mailman logfile CRLF injection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in Utils.py in Mailman before 2.1.9rc1 allows remote attackers to spoof messages in the error log and possibly trick the administrator into visiting malicious URLs via CRLF sequences in the URI.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact and expects to release a future update to address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which are in maintenance mode.

This bug will be addressed in a future update of Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0779">RHSA-2007:0779</Advisory>
        <Package name="mailman">mailman-3:2.1.5.1-34.rhel4.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4624
https://nvd.nist.gov/vuln/detail/CVE-2006-4624
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4625">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-09T00:00:00</PublicDate>
    <Bugzilla id="206276" url="https://bugzilla.redhat.com/show_bug.cgi?id=206276" xml:lang="en:us">
CVE-2006-4625 PHP safe mode bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4625
https://nvd.nist.gov/vuln/detail/CVE-2006-4625
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4640">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-09-12T18:00:00</PublicDate>
    <Bugzilla id="1618200" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618200" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Adobe Flash Player before 9.0.16.0 allows user-assisted remote attackers to bypass the allowScriptAccess protection via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Red Hat Desktop version 3 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Red Hat Desktop version 4 Extras</ProductName>
        <ReleaseDate>2006-09-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0674">RHSA-2006:0674</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4640
https://nvd.nist.gov/vuln/detail/CVE-2006-4640
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4790">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-08T00:00:00</PublicDate>
    <Bugzilla id="1618201" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618201" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0680">RHSA-2006:0680</Advisory>
        <Package name="gnutls">gnutls-0:1.0.20-3.2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4790
https://nvd.nist.gov/vuln/detail/CVE-2006-4790
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4805">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-30T00:00:00</PublicDate>
    <Bugzilla id="1618202" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618202" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4805
https://nvd.nist.gov/vuln/detail/CVE-2006-4805
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4806">
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in imlib2 allow user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) ARGB (loader_argb.c), (2) PNG (loader_png.c), (3) LBM (loader_lbm.c), (4) JPEG (loader_jpeg.c), or (5) TIFF (loader_tiff.c) images.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4806
https://nvd.nist.gov/vuln/detail/CVE-2006-4806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4807">
    <Details source="Mitre" xml:lang="en:us">
loader_tga.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted TGA image that triggers an out-of-bounds memory read, a different issue than CVE-2006-4808.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4807
https://nvd.nist.gov/vuln/detail/CVE-2006-4807
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4808">
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in loader_tga.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TGA image.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4808
https://nvd.nist.gov/vuln/detail/CVE-2006-4808
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4809">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in loader_pnm.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM image.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4809
https://nvd.nist.gov/vuln/detail/CVE-2006-4809
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4810">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-08T00:00:00</PublicDate>
    <Bugzilla id="1618203" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618203" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.0b-3.el2.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.5-3.el3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0727">RHSA-2006:0727</Advisory>
        <Package name="texinfo">texinfo-0:4.7-5.el4.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4810
https://nvd.nist.gov/vuln/detail/CVE-2006-4810
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4811">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-10-13T23:06:00</PublicDate>
    <Bugzilla id="1618204" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618204" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0720">RHSA-2006:0720</Advisory>
        <Package name="kdelibs">kdelibs-6:2.2.2-21.EL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0725">RHSA-2006:0725</Advisory>
        <Package name="qt">qt-1:2.3.1-12.EL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0720">RHSA-2006:0720</Advisory>
        <Package name="kdelibs">kdelibs-6:3.1.3-6.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0725">RHSA-2006:0725</Advisory>
        <Package name="qt">qt-1:3.1.2-14.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0720">RHSA-2006:0720</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-6.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0725">RHSA-2006:0725</Advisory>
        <Package name="qt">qt-1:3.3.3-10.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4811
https://nvd.nist.gov/vuln/detail/CVE-2006-4811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4812">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-30T00:00:00</PublicDate>
    <Bugzilla id="1618205" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618205" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 3, and 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0708">RHSA-2006:0708</Advisory>
        <Package name="php">php-0:4.1.2-2.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0688">RHSA-2006:0688</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4812
https://nvd.nist.gov/vuln/detail/CVE-2006-4812
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4813">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-10-11T00:00:00</PublicDate>
    <Bugzilla id="1618206" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618206" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Dmitriy Monakhov for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4813
https://nvd.nist.gov/vuln/detail/CVE-2006-4813
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4814">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-14T00:00:00</PublicDate>
    <Bugzilla id="306971" url="https://bugzilla.redhat.com/show_bug.cgi?id=306971" xml:lang="en:us">
kernel Race condition in mincore can cause &quot;ps -ef&quot; to hang
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0787">RHSA-2008:0787</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.67</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0001">RHSA-2009:0001</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.74</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-05-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0211">RHSA-2008:0211</Advisory>
        <Package name="kernel">kernel-0:2.4.21-57.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4814
https://nvd.nist.gov/vuln/detail/CVE-2006-4814
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4842">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-05T00:00:00</PublicDate>
    <Bugzilla id="1253692" url="https://bugzilla.redhat.com/show_bug.cgi?id=1253692" xml:lang="en:us">
nspr: setuid root programs linked with NSPR allow elevation of privilege
    </Bugzilla>
    <CWE>CWE-270</CWE>
    <Details source="Mitre" xml:lang="en:us">
The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.
    </Details>
    <Statement xml:lang="en:us">
This issue also affects other OS that use NSPR. However, Red Hat does not ship any application linked setuid or setgid against NSPR and therefore is not vulnerable to this issue.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nspr</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nspr</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nspr</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>nspr</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4842
https://nvd.nist.gov/vuln/detail/CVE-2006-4842
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4924">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-19T00:00:00</PublicDate>
    <Bugzilla id="207957" url="https://bugzilla.redhat.com/show_bug.cgi?id=207957" xml:lang="en:us">
openssh DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0698">RHSA-2006:0698</Advisory>
        <Package name="openssh">openssh-0:3.1p1-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0697">RHSA-2006:0697</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0697">RHSA-2006:0697</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4924
https://nvd.nist.gov/vuln/detail/CVE-2006-4924
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4925">
    <Details source="Mitre" xml:lang="en:us">
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw a security issue. This flaw can cause an OpenSSH client to crash when connecting to a malicious server, which does not result in a denial of service condition.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4925
https://nvd.nist.gov/vuln/detail/CVE-2006-4925
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4980">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-08-16T00:00:00</PublicDate>
    <Bugzilla id="430641" url="https://bugzilla.redhat.com/show_bug.cgi?id=430641" xml:lang="en:us">
python repr unicode buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0713">RHSA-2006:0713</Advisory>
        <Package name="python">python-0:2.2.3-6.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0713">RHSA-2006:0713</Advisory>
        <Package name="python">python-0:2.3.4-14.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4980
https://nvd.nist.gov/vuln/detail/CVE-2006-4980
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-4997">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-12T00:00:00</PublicDate>
    <Bugzilla id="1618207" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618207" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0012">RHSA-2007:0012</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.64</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0013">RHSA-2007:0013</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.71</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0689">RHSA-2006:0689</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.3.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-4997
https://nvd.nist.gov/vuln/detail/CVE-2006-4997
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5051">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="208347" url="https://bugzilla.redhat.com/show_bug.cgi?id=208347" xml:lang="en:us">
unsafe GSSAPI signal handler
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0698">RHSA-2006:0698</Advisory>
        <Package name="openssh">openssh-0:3.1p1-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0697">RHSA-2006:0697</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-09-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0697">RHSA-2006:0697</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5051
https://nvd.nist.gov/vuln/detail/CVE-2006-5051
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5052">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="234643" url="https://bugzilla.redhat.com/show_bug.cgi?id=234643" xml:lang="en:us">
Kerberos information leak
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI &quot;authentication abort.&quot;
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect Red Hat Enterprise Linux 2.1 and 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0703">RHSA-2007:0703</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0540">RHSA-2007:0540</Advisory>
        <Package name="openssh">openssh-0:4.3p2-24.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5052
https://nvd.nist.gov/vuln/detail/CVE-2006-5052
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5158">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="243251" url="https://bugzilla.redhat.com/show_bug.cgi?id=243251" xml:lang="en:us">
NFS lockd deadlock
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5158
https://nvd.nist.gov/vuln/detail/CVE-2006-5158
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5159">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in Mozilla Firefox allows remote attackers to execute arbitrary code via unspecified vectors involving JavaScript.  NOTE: the vendor and original researchers have released a follow-up comment disputing the severity of this issue, in which the researcher states that &quot;we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this... I have not succeeded in making this code do anything more than cause a crash and eat up system resources&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability.  We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat.  In the event more information becomes available, we will revisit this issue in the future.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5159
https://nvd.nist.gov/vuln/detail/CVE-2006-5159
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5160">
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Mozilla Firefox have unspecified vectors and impact, as claimed during ToorCon 2006.  NOTE: the vendor and original researchers have released a follow-up comment disputing this issue, in which one researcher states that &quot;I have no undisclosed Firefox vulnerabilities. The person who was speaking with me made this claim, and I honestly have no idea if he has them or not.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability.  We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat.  In the event more information becomes available, we will revisit this issue in the future.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5160
https://nvd.nist.gov/vuln/detail/CVE-2006-5160
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5170">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-20T00:00:00</PublicDate>
    <Bugzilla id="1618208" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618208" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0719">RHSA-2006:0719</Advisory>
        <Package name="nss_ldap">nss_ldap-0:226-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5170
https://nvd.nist.gov/vuln/detail/CVE-2006-5170
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5173">
    <Details source="Mitre" xml:lang="en:us">
Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  This flaw only affects kernel versions 2.6.14 to 2.6.18.  Red Hat Enterprise Linux 2.1, 3, and 4 does not ship with a vulnerable kernel version.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5173
https://nvd.nist.gov/vuln/detail/CVE-2006-5173
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5174">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-09-28T00:00:00</PublicDate>
    <Bugzilla id="1618209" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618209" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by &quot;appending to a file from a bad address,&quot; which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0710">RHSA-2006:0710</Advisory>
        <Package name="kernel">kernel-0:2.4.21-47.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5174
https://nvd.nist.gov/vuln/detail/CVE-2006-5174
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5178">
    <Details source="Mitre" xml:lang="en:us">
Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5178
https://nvd.nist.gov/vuln/detail/CVE-2006-5178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5214">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-16T00:00:00</PublicDate>
    <Bugzilla id="230007" url="https://bugzilla.redhat.com/show_bug.cgi?id=230007" xml:lang="en:us">
xdm race
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060225, and Solaris 8 through 10 before 20061006, causes a user's Xsession errors file to have weak permissions before a chmod is performed, which allows local users to read Xsession errors files of other users.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5214
https://nvd.nist.gov/vuln/detail/CVE-2006-5214
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5215">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-16T00:00:00</PublicDate>
    <Bugzilla id="230008" url="https://bugzilla.redhat.com/show_bug.cgi?id=230008" xml:lang="en:us">
xdm symlink attack
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5215
https://nvd.nist.gov/vuln/detail/CVE-2006-5215
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5229">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime.  NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
    </Details>
    <Statement xml:lang="en:us">
Red Hat has been unable to reproduce this flaw and believes that the reporter was experiencing behavior specific to his environment.  We will not be releasing update to address this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5229
https://nvd.nist.gov/vuln/detail/CVE-2006-5229
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5297">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-04T00:00:00</PublicDate>
    <Bugzilla id="211085" url="https://bugzilla.redhat.com/show_bug.cgi?id=211085" xml:lang="en:us">
Multiple mutt tempfile race conditions
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an NFS filesystem, allows local users to overwrite arbitrary files due to limitations of the use of the O_EXCL flag on NFS filesystems.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-12.0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.2.2-3.0.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5297
https://nvd.nist.gov/vuln/detail/CVE-2006-5297
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5298">
    <Details source="Mitre" xml:lang="en:us">
The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and earlier does not properly verify that temporary files have been created with restricted permissions, which might allow local users to create files with weak permissions via a race condition between the mktemp and safe_fopen function calls.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=211085

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5298
https://nvd.nist.gov/vuln/detail/CVE-2006-5298
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5330">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-17T00:00:00</PublicDate>
    <Bugzilla id="1618210" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618210" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType.  NOTE: the flexibility of the attack varies depending on the type of web browser being used.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0009">RHSA-2007:0009</Advisory>
        <Package name="flash-plugin">flash-plugin-0:7.0.69-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-01-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0009">RHSA-2007:0009</Advisory>
        <Package name="flash-plugin">flash-plugin-0:7.0.69-1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5330
https://nvd.nist.gov/vuln/detail/CVE-2006-5330
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5397">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-18T00:00:00</PublicDate>
    <Bugzilla id="213280" url="https://bugzilla.redhat.com/show_bug.cgi?id=213280" xml:lang="en:us">
CVE-2006-5397 libX11 file descriptor leak
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Xinput module (modules/im/ximcp/imLcIm.c) in X.Org libX11 1.0.2 and 1.0.3 opens a file for reading twice using the same file descriptor, which causes a file descriptor leak that allows local users to read files specified by the XCOMPOSEFILE environment variable via the duplicate file descriptor.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of libX11 as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5397
https://nvd.nist.gov/vuln/detail/CVE-2006-5397
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5456">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-29T00:00:00</PublicDate>
    <Bugzilla id="210921" url="https://bugzilla.redhat.com/show_bug.cgi?id=210921" xml:lang="en:us">
Overflows in GraphicsMagick and ImageMagick's DCM and PALM handling routines
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in GraphicsMagick before 1.1.7 and ImageMagick 6.0.7 allow user-assisted attackers to cause a denial of service and possibly execute arbitrary code via (1) a DCM image that is not properly handled by the ReadDCMImage function in coders/dcm.c, or (2) a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16.0.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5456
https://nvd.nist.gov/vuln/detail/CVE-2006-5456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5462">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-11-08T01:03:00</PublicDate>
    <Bugzilla id="1618211" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618211" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0733">RHSA-2006:0733</Advisory>
        <Package name="firefox">firefox-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0735">RHSA-2006:0735</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5462
https://nvd.nist.gov/vuln/detail/CVE-2006-5462
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5463">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-08T01:03:00</PublicDate>
    <Bugzilla id="1618212" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618212" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary JavaScript bytecode via unspecified vectors involving modification of a Script object while it is executing.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0733">RHSA-2006:0733</Advisory>
        <Package name="firefox">firefox-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0735">RHSA-2006:0735</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5463
https://nvd.nist.gov/vuln/detail/CVE-2006-5463
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5464">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-08T01:03:00</PublicDate>
    <Bugzilla id="1618214" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618214" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0733">RHSA-2006:0733</Advisory>
        <Package name="firefox">firefox-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0735">RHSA-2006:0735</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5464
https://nvd.nist.gov/vuln/detail/CVE-2006-5464
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5465">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-11-02T00:00:00</PublicDate>
    <Bugzilla id="213732" url="https://bugzilla.redhat.com/show_bug.cgi?id=213732" xml:lang="en:us">
PHP buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0730">RHSA-2006:0730</Advisory>
        <Package name="php">php-0:4.1.2-2.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0730">RHSA-2006:0730</Advisory>
        <Package name="php">php-0:4.3.2-37.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0730">RHSA-2006:0730</Advisory>
        <Package name="php">php-0:4.3.9-3.22</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0731">RHSA-2006:0731</Advisory>
        <Package name="php">php-0:5.1.4-1.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)</ProductName>
        <ReleaseDate>2006-12-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0736">RHSA-2006:0736</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5465
https://nvd.nist.gov/vuln/detail/CVE-2006-5465
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5466">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-29T00:00:00</PublicDate>
    <Bugzilla id="213515" url="https://bugzilla.redhat.com/show_bug.cgi?id=213515" xml:lang="en:us">
RPM Crash after listing contents of non-installed package
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
    </Details>
    <Statement xml:lang="en:us">
Red Hat non longer plans to fix this flaw in Red Hat Enterprise Linux 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5466
https://nvd.nist.gov/vuln/detail/CVE-2006-5466
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5467">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-25T00:00:00</PublicDate>
    <Bugzilla id="212396" url="https://bugzilla.redhat.com/show_bug.cgi?id=212396" xml:lang="en:us">
Ruby CGI multipart parsing DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The cgi.rb CGI library for Ruby 1.8 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an HTTP request with a multipart MIME body that contains an invalid boundary specifier, as demonstrated using a specifier that begins with a &quot;-&quot; instead of &quot;--&quot; and contains an inconsistent ID.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0729">RHSA-2006:0729</Advisory>
        <Package name="ruby">ruby-0:1.6.4-2.AS21.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0729">RHSA-2006:0729</Advisory>
        <Package name="ruby">ruby-0:1.6.8-9.EL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0729">RHSA-2006:0729</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5467
https://nvd.nist.gov/vuln/detail/CVE-2006-5467
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5468">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-30T00:00:00</PublicDate>
    <Bugzilla id="1618215" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618215" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5468
https://nvd.nist.gov/vuln/detail/CVE-2006-5468
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5469">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-30T00:00:00</PublicDate>
    <Bugzilla id="1618216" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618216" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5469
https://nvd.nist.gov/vuln/detail/CVE-2006-5469
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5540">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-16T00:00:00</PublicDate>
    <Bugzilla id="1618217" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618217" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a &quot;MIN/MAX index optimization.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0064">RHSA-2007:0064</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.18-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0064">RHSA-2007:0064</Advisory>
        <Package name="postgresql">postgresql-0:7.4.16-1.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0068">RHSA-2007:0068</Advisory>
        <Package name="postgresql">postgresql-0:8.1.8-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0067">RHSA-2007:0067</Advisory>
        <Package name="postgresql">postgresql-0:8.1.7-3.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5540
https://nvd.nist.gov/vuln/detail/CVE-2006-5540
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5541">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-16T00:00:00</PublicDate>
    <Bugzilla id="1618218" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618218" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via a coercion of an unknown element to ANYARRAY.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0068">RHSA-2007:0068</Advisory>
        <Package name="postgresql">postgresql-0:8.1.8-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0067">RHSA-2007:0067</Advisory>
        <Package name="postgresql">postgresql-0:8.1.7-3.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5541
https://nvd.nist.gov/vuln/detail/CVE-2006-5541
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5542">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-16T00:00:00</PublicDate>
    <Bugzilla id="212360" url="https://bugzilla.redhat.com/show_bug.cgi?id=212360" xml:lang="en:us">
New version fixes three different crash vulnerabilities
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) related to duration logging of V3-protocol Execute messages for (1) COMMIT and (2) ROLLBACK SQL statements.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0068">RHSA-2007:0068</Advisory>
        <Package name="postgresql">postgresql-0:8.1.8-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0067">RHSA-2007:0067</Advisory>
        <Package name="postgresql">postgresql-0:8.1.7-3.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5542
https://nvd.nist.gov/vuln/detail/CVE-2006-5542
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5619">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-10-31T00:00:00</PublicDate>
    <Bugzilla id="1618220" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618220" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in Linux kernel 2.6 up to 2.6.18-stable allows local users to cause a denial of service (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and are tracking it via bug 213214 for Red Hat Enterprise Linux 4:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213214

This issue does not affect Red Hat Enterprise Linux 2.1 or 3
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5619
https://nvd.nist.gov/vuln/detail/CVE-2006-5619
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5633">
    <Details source="Mitre" xml:lang="en:us">
Firefox 1.5.0.7 and 2.0, and Seamonkey 1.1b, allows remote attackers to cause a denial of service (crash) by creating a range object using createRange, calling selectNode on a DocType node (DOCUMENT_TYPE_NODE), then calling createContextualFragment on the range, which triggers a null dereference.  NOTE: the original Bugtraq post mentioned that code execution was possible, but followup analysis has shown that it is only a null dereference.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user-assisted crash of a client application such as Firefox to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5633
https://nvd.nist.gov/vuln/detail/CVE-2006-5633
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5649">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the &quot;alignment check exception handling&quot; in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, or 5.  Red Hat Enterprise Linux 2.1 did not ship for PowerPC architecture.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5649
https://nvd.nist.gov/vuln/detail/CVE-2006-5649
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5701">
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  The squashfs module is not distributed as part of Red Hat Enterprise Linux 2.1, 3, or 4.  Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5701
https://nvd.nist.gov/vuln/detail/CVE-2006-5701
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5706">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerabilities in PHP, probably before 5.2.0, allow local users to bypass open_basedir restrictions and perform unspecified actions via unspecified vectors involving the (1) chdir and (2) tempnam functions.  NOTE: the tempnam vector might overlap CVE-2006-1494.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5706
https://nvd.nist.gov/vuln/detail/CVE-2006-5706
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5740">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-30T00:00:00</PublicDate>
    <Bugzilla id="1618222" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618222" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0726">RHSA-2006:0726</Advisory>
        <Package name="wireshark">wireshark-0:0.99.4-EL4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5740
https://nvd.nist.gov/vuln/detail/CVE-2006-5740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5747">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-08T01:03:00</PublicDate>
    <Bugzilla id="1618223" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618223" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0733">RHSA-2006:0733</Advisory>
        <Package name="firefox">firefox-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0735">RHSA-2006:0735</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5747
https://nvd.nist.gov/vuln/detail/CVE-2006-5747
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5748">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-08T01:03:00</PublicDate>
    <Bugzilla id="214822" url="https://bugzilla.redhat.com/show_bug.cgi?id=214822" xml:lang="en:us">
seamonkey &lt; 1.0.6 multiple vulnerabilities
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0733">RHSA-2006:0733</Advisory>
        <Package name="firefox">firefox-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0734">RHSA-2006:0734</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.6-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0735">RHSA-2006:0735</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.8-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5748
https://nvd.nist.gov/vuln/detail/CVE-2006-5748
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5749">
    <Details source="Mitre" xml:lang="en:us">
The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5749
https://nvd.nist.gov/vuln/detail/CVE-2006-5749
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5750">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-27T14:00:00</PublicDate>
    <Bugzilla id="1618224" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618224" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5 allows remote authenticated users to read or modify arbitrary files, and possibly execute arbitrary code, via unspecified vectors related to the console manager.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2006-11-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0743">RHSA-2006:0743</Advisory>
        <Package name="jbossas">jbossas-0:4.0.4-1.el4s1.25</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5750
https://nvd.nist.gov/vuln/detail/CVE-2006-5750
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5751">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-11-29T00:00:00</PublicDate>
    <Bugzilla id="216452" url="https://bugzilla.redhat.com/show_bug.cgi?id=216452" xml:lang="en:us">
Linux kernel get_fdb_entries() integer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
    </Details>
    <Statement xml:lang="en:us">
This flaw does not affect the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5751
https://nvd.nist.gov/vuln/detail/CVE-2006-5751
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5752">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-20T00:00:00</PublicDate>
    <Bugzilla id="245112" url="https://bugzilla.redhat.com/show_bug.cgi?id=245112" xml:lang="en:us">
httpd mod_status XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform &quot;charset detection&quot; when the content-type is not specified.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0532">RHSA-2007:0532</Advisory>
        <Package name="apache">apache-0:1.3.27-12.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0533">RHSA-2007:0533</Advisory>
        <Package name="httpd">httpd-0:2.0.46-67.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0534">RHSA-2007:0534</Advisory>
        <Package name="httpd">httpd-0:2.0.52-32.2.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0556">RHSA-2007:0556</Advisory>
        <Package name="httpd">httpd-0:2.2.3-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0557">RHSA-2007:0557</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5752
https://nvd.nist.gov/vuln/detail/CVE-2006-5752
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5753">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-03T00:00:00</PublicDate>
    <Bugzilla id="306891" url="https://bugzilla.redhat.com/show_bug.cgi?id=306891" xml:lang="en:us">
kernel listxattr syscall can corrupt user space programs
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>7.2</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:C/I:C/A:C</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-681-&gt;CWE-119</CWE>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the listxattr system call in Linux kernel, when a &quot;bad inode&quot; is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 2.1 is not vulnerable to this issue as it only affects x86_64 architectures.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch at release.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5753
https://nvd.nist.gov/vuln/detail/CVE-2006-5753
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5754">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-23T00:00:00</PublicDate>
    <Bugzilla id="1618225" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618225" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Kostantin Khorenko for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5754
https://nvd.nist.gov/vuln/detail/CVE-2006-5754
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5755">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-26T00:00:00</PublicDate>
    <Bugzilla id="457718" url="https://bugzilla.redhat.com/show_bug.cgi?id=457718" xml:lang="en:us">
kernel: local denial of service due to NT bit leakage
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-11-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0957">RHSA-2008:0957</Advisory>
        <Package name="kernel">kernel-0:2.6.18-92.1.18.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5755
https://nvd.nist.gov/vuln/detail/CVE-2006-5755
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5757">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-05T00:00:00</PublicDate>
    <Bugzilla id="1618226" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618226" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5757
https://nvd.nist.gov/vuln/detail/CVE-2006-5757
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5779">
    <Details source="Mitre" xml:lang="en:us">
OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  The OpenLDAP versions shipped with Red Hat Enterprise Linux 4 and earlier do not contain the vulnerable code in question.  Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5779
https://nvd.nist.gov/vuln/detail/CVE-2006-5779
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5793">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-14T00:00:00</PublicDate>
    <Bugzilla id="215405" url="https://bugzilla.redhat.com/show_bug.cgi?id=215405" xml:lang="en:us">
libpng DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Glenn Randers-Pehrson, Mats Palmgren, and Tavis Ormandy for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.0.14-10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.2-27</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.7-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng10">libpng10-0:1.0.16-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.10-7.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5793
https://nvd.nist.gov/vuln/detail/CVE-2006-5793
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5794">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-07T00:00:00</PublicDate>
    <Bugzilla id="214641" url="https://bugzilla.redhat.com/show_bug.cgi?id=214641" xml:lang="en:us">
OpenSSH privilege separation flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect Red Hat Enterprise Linux 2.1.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0738">RHSA-2006:0738</Advisory>
        <Package name="openssh">openssh-0:3.6.1p2-33.30.13</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0738">RHSA-2006:0738</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.17.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5794
https://nvd.nist.gov/vuln/detail/CVE-2006-5794
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5823">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-07T00:00:00</PublicDate>
    <Bugzilla id="1618227" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618227" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs.
    </Details>
    <Statement xml:lang="en:us">
The CVE-2006-5823 is about a corrupted cramfs (MOKB-07-11-2006) that can cause a memory corruption and so crash the machine.

For Red Hat Enterpise Linux 3 this issue is tracked via Bugzilla #216960 and for Red Hat Enterprise Linux 4 it is tracked via Bugzilla #216958.

Red Hat Enterprise Linux 2.1 is not vulnerable to this issue.

This issue has been rated as having low impact, because root privileges or physical access to the machine are needed to mount a corrupted filesystem and crash the machine.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0436">RHSA-2007:0436</Advisory>
        <Package name="kernel">kernel-0:2.4.21-50.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5823
https://nvd.nist.gov/vuln/detail/CVE-2006-5823
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5857">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-01-10T00:00:00</PublicDate>
    <Bugzilla id="1618228" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618228" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.1.1.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-atk">acroread-libs-atk-0:1.8.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-glib2">acroread-libs-glib2-0:2.4.7-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2">acroread-libs-gtk2-0:2.4.13-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2-engines">acroread-libs-gtk2-engines-0:2.2.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-pango">acroread-libs-pango-0:1.6.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0017">RHSA-2007:0017</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.2.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5857
https://nvd.nist.gov/vuln/detail/CVE-2006-5857
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5864">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-29T00:00:00</PublicDate>
    <Bugzilla id="217672" url="https://bugzilla.redhat.com/show_bug.cgi?id=217672" xml:lang="en:us">
CVE-2006-5864 evince contains a buffer overflow in get_next_text()
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1.  This issue did not affect Red Hat Enterprise Linux 3 or 4.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=215593

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5864
https://nvd.nist.gov/vuln/detail/CVE-2006-5864
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5867">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-04T00:00:00</PublicDate>
    <Bugzilla id="221984" url="https://bugzilla.redhat.com/show_bug.cgi?id=221984" xml:lang="en:us">
fetchmail not enforcing TLS for POP3 properly
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:5.9.0-21.7.3.el2.1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.0-3.el3.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0018">RHSA-2007:0018</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.5-6.el4.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5867
https://nvd.nist.gov/vuln/detail/CVE-2006-5867
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5868">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-09-29T00:00:00</PublicDate>
    <Bugzilla id="217560" url="https://bugzilla.redhat.com/show_bug.cgi?id=217560" xml:lang="en:us">
Insufficient boundary check in ImageMagick's SGIDecode()
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Imagemagick 6.0 before 6.0.6.2, and 6.2 before 6.2.4.5, has unknown impact and user-assisted attack vectors via a crafted SGI image.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0015">RHSA-2007:0015</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-16.0.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5868
https://nvd.nist.gov/vuln/detail/CVE-2006-5868
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5870">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-03T00:00:00</PublicDate>
    <Bugzilla id="1618229" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618229" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0001">RHSA-2007:0001</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-35.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0001">RHSA-2007:0001</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-6.6.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5870
https://nvd.nist.gov/vuln/detail/CVE-2006-5870
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5871">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2004-10-19T00:00:00</PublicDate>
    <Bugzilla id="1618230" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618230" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2005-10-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2005:514">RHSA-2005:514</Advisory>
        <Package name="kernel">kernel-0:2.6.9-22.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5871
https://nvd.nist.gov/vuln/detail/CVE-2006-5871
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5876">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-11-11T00:00:00</PublicDate>
    <Bugzilla id="223144" url="https://bugzilla.redhat.com/show_bug.cgi?id=223144" xml:lang="en:us">
CVE-2006-5876 libsoup Server code crashes upon receiving malformed GET HTTP header
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The vulnerable code is not used by any application likned with libsoup shipped with Red Hat Enterprise Linux 2.1, 3, and 4.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5876
https://nvd.nist.gov/vuln/detail/CVE-2006-5876
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5925">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-11-15T01:51:00</PublicDate>
    <Bugzilla id="1618231" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618231" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0742">RHSA-2006:0742</Advisory>
        <Package name="elinks">elinks-0:0.9.2-3.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5925
https://nvd.nist.gov/vuln/detail/CVE-2006-5925
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5969">
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the evalFolderLine function in fvwm 2.5.18 and earlier allows local users to execute arbitrary commands via carriage returns in a directory name, which is not properly handled by fvwm-menu-directory, a variant of CVE-2003-1308.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with fvwm, however this issue does not affect the included version of fvwm.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5969
https://nvd.nist.gov/vuln/detail/CVE-2006-5969
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5974">
    <Details source="Mitre" xml:lang="en:us">
fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the versions of fetchmail distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5974
https://nvd.nist.gov/vuln/detail/CVE-2006-5974
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-5989">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-13T00:00:00</PublicDate>
    <Bugzilla id="1618232" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618232" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the der_get_oid function in mod_auth_kerb 5.0 allows remote attackers to cause a denial of service (crash) via a crafted Kerberos message that triggers a heap-based buffer overflow in the component array.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0746">RHSA-2006:0746</Advisory>
        <Package name="mod_auth_kerb">mod_auth_kerb-0:5.0-1.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-5989
https://nvd.nist.gov/vuln/detail/CVE-2006-5989
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6015">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the JavaScript implementation in Safari on Apple Mac OS X 10.4 allows remote attackers to cause a denial of service (application crash) via a long argument to the exec method of a regular expression.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider unexploitable client application crashes to be security flaws. This bug causes a stack recursion crash which is not exploitable.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6015
https://nvd.nist.gov/vuln/detail/CVE-2006-6015
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6027">
    <Details source="Mitre" xml:lang="en:us">
Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the LoadFile method in an AcroPDF ActiveX control.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect Linux versions of Adobe Reader.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6027
https://nvd.nist.gov/vuln/detail/CVE-2006-6027
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6053">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-10T00:00:00</PublicDate>
    <Bugzilla id="1618233" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618233" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6053
https://nvd.nist.gov/vuln/detail/CVE-2006-6053
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6054">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-12T00:00:00</PublicDate>
    <Bugzilla id="1618234" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618234" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0672">RHSA-2007:0672</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.72</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0673">RHSA-2007:0673</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.65</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0436">RHSA-2007:0436</Advisory>
        <Package name="kernel">kernel-0:2.4.21-50.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6054
https://nvd.nist.gov/vuln/detail/CVE-2006-6054
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6056">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-14T00:00:00</PublicDate>
    <Bugzilla id="1618235" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618235" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6056
https://nvd.nist.gov/vuln/detail/CVE-2006-6056
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6057">
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel 2.6.x up to 2.6.18, and possibly other versions, on Fedora Core 6 and possibly other operating systems, allows local users to cause a denial of service (crash) via a malformed gfs2 file stream that triggers a NULL pointer dereference in the init_journal function.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable.  The kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 do not contain gfs2 filesystem support.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6057
https://nvd.nist.gov/vuln/detail/CVE-2006-6057
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6058">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-17T00:00:00</PublicDate>
    <Bugzilla id="217007" url="https://bugzilla.redhat.com/show_bug.cgi?id=217007" xml:lang="en:us">
minix_bmap denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function.  NOTE: this issue might be due to an integer overflow or signedness error.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0672">RHSA-2007:0672</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.72</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6058
https://nvd.nist.gov/vuln/detail/CVE-2006-6058
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6077">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618236" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618236" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6077
https://nvd.nist.gov/vuln/detail/CVE-2006-6077
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6097">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-21T00:00:00</PublicDate>
    <Bugzilla id="1618237" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618237" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0749">RHSA-2006:0749</Advisory>
        <Package name="tar">tar-0:1.13.25-6.AS21.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0749">RHSA-2006:0749</Advisory>
        <Package name="tar">tar-0:1.13.25-15.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0749">RHSA-2006:0749</Advisory>
        <Package name="tar">tar-0:1.14-12.RHEL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6097
https://nvd.nist.gov/vuln/detail/CVE-2006-6097
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6101">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-09T00:00:00</PublicDate>
    <Bugzilla id="1618238" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618238" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-78.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-115.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0003">RHSA-2007:0003</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6101
https://nvd.nist.gov/vuln/detail/CVE-2006-6101
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6102">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-09T00:00:00</PublicDate>
    <Bugzilla id="1618239" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618239" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-78.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-115.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0003">RHSA-2007:0003</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6102
https://nvd.nist.gov/vuln/detail/CVE-2006-6102
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6103">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-01-09T00:00:00</PublicDate>
    <Bugzilla id="1618240" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618240" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-78.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0002">RHSA-2007:0002</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-115.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0003">RHSA-2007:0003</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6103
https://nvd.nist.gov/vuln/detail/CVE-2006-6103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6105">
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the host chooser window (gdmchooser) in GNOME Foundation Display Manager (gdm) allows local users to execute arbitrary code via format string specifiers in a hostname, which are used in an error dialog.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw was first introduced in gdm version 2.14.  Therefore these issues did not affect the earlier versions of gdm as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6105
https://nvd.nist.gov/vuln/detail/CVE-2006-6105
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6106">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-14T00:00:00</PublicDate>
    <Bugzilla id="1618241" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618241" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it for Red Hat Enterprise Linux 4 via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218602

This issue does not affect the version of the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6106
https://nvd.nist.gov/vuln/detail/CVE-2006-6106
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6107">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-12T00:00:00</PublicDate>
    <Bugzilla id="219665" url="https://bugzilla.redhat.com/show_bug.cgi?id=219665" xml:lang="en:us">
D-Bus denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the match_rule_equal function in bus/signals.c in D-Bus before 1.0.2 allows local applications to remove match rules for other applications and cause a denial of service (lost process messages).
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0008">RHSA-2007:0008</Advisory>
        <Package name="dbus">dbus-0:0.22-12.EL.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6107
https://nvd.nist.gov/vuln/detail/CVE-2006-6107
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6120">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-29T00:00:00</PublicDate>
    <Bugzilla id="218030" url="https://bugzilla.redhat.com/show_bug.cgi?id=218030" xml:lang="en:us">
koffice: update to 1.6.1
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the KPresenter import filter for Microsoft PowerPoint files (filters/olefilters/lib/klaola.cc) in KOffice before 1.6.1 allows user-assisted remote attackers to execute arbitrary code via a crafted PPT file, which results in a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0010">RHSA-2007:0010</Advisory>
        <Package name="koffice">koffice-3:1.1.1-2.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6120
https://nvd.nist.gov/vuln/detail/CVE-2006-6120
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6142">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-02T00:00:00</PublicDate>
    <Bugzilla id="218297" url="https://bugzilla.redhat.com/show_bug.cgi?id=218297" xml:lang="en:us">
Three XSS issues in SquirrelMail
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving &quot;a shortcoming in the magicHTML filter.&quot;
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0022">RHSA-2007:0022</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0022">RHSA-2007:0022</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6142
https://nvd.nist.gov/vuln/detail/CVE-2006-6142
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6143">
    <Details source="Mitre" xml:lang="en:us">
The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 ship with versions of Kerberos 5 prior to version 1.4 and are therefore not affected by these vulnerabilities.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6143
https://nvd.nist.gov/vuln/detail/CVE-2006-6143
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6144">
    <Details source="Mitre" xml:lang="en:us">
The &quot;mechglue&quot; abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 ship with versions of Kerberos 5 prior to version 1.4 and are therefore not affected by these vulnerabilities.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6144
https://nvd.nist.gov/vuln/detail/CVE-2006-6144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6169">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-24T00:00:00</PublicDate>
    <Bugzilla id="217950" url="https://bugzilla.redhat.com/show_bug.cgi?id=217950" xml:lang="en:us">
: gnupg2 &lt; 2.0.1 buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with &quot;C-escape&quot; expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this bug to be a security flaw. In order for this flaw to be exploited, a user would be required to enter shellcode into an interactive GnuPG session. Red Hat considers this to be an unlikely scenario.

Red Hat Enterprise Linux 5 contains a backported patch to address this issue.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.0.7-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6169
https://nvd.nist.gov/vuln/detail/CVE-2006-6169
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6235">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-12-06T00:00:00</PublicDate>
    <Bugzilla id="1618242" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618242" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A &quot;stack overwrite&quot; vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.0.7-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0754">RHSA-2006:0754</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6235
https://nvd.nist.gov/vuln/detail/CVE-2006-6235
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6236">
    <Details source="Mitre" xml:lang="en:us">
Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the (1) src, (2) setPageMode, (3) setLayoutMode, and (4) setNamedDest methods in an AcroPDF ActiveX control, a different set of vectors than CVE-2006-6027.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the Linux version of Adobe Reader.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6236
https://nvd.nist.gov/vuln/detail/CVE-2006-6236
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6297">
    <Details source="Mitre" xml:lang="en:us">
Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as Konqueror or other KFile users to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6297
https://nvd.nist.gov/vuln/detail/CVE-2006-6297
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6303">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-04T00:00:00</PublicDate>
    <Bugzilla id="218287" url="https://bugzilla.redhat.com/show_bug.cgi?id=218287" xml:lang="en:us">
ruby's cgi.rb vulnerable infinite loop DoS
    </Bugzilla>
    <CWE>CWE-835</CWE>
    <Details source="Mitre" xml:lang="en:us">
The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0562">RHSA-2008:0562</Advisory>
        <Package name="ruby">ruby-0:1.6.4-6.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-07-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0562">RHSA-2008:0562</Advisory>
        <Package name="ruby">ruby-0:1.6.8-12.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0961">RHSA-2007:0961</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.8.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6303
https://nvd.nist.gov/vuln/detail/CVE-2006-6303
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6304">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2009-11-12T00:00:00</PublicDate>
    <Bugzilla id="537273" url="https://bugzilla.redhat.com/show_bug.cgi?id=537273" xml:lang="en:us">
kernel: use flag in do_coredump()
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>1.9</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit d025c9db that introduced the problem.

This upstream commit was backported in Red Hat Enterprise Linux 5 via RHSA-2009:0225. It was later reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0046.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-01-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0046">RHSA-2010:0046</Advisory>
        <Package name="kernel">kernel-0:2.6.18-164.11.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6304
https://nvd.nist.gov/vuln/detail/CVE-2006-6304
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6305">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Net-SNMP 5.3 before 5.3.0.1, when configured using the rocommunity or rouser snmpd.conf tokens, causes Net-SNMP to grant write access to users or communities that only have read-only access.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of net-smtp as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6305
https://nvd.nist.gov/vuln/detail/CVE-2006-6305
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6332">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in net80211/ieee80211_wireless.c in MadWifi before 0.9.2.1 allows remote attackers to execute arbitrary code via unspecified vectors, related to the encode_ie and giwscan_cb functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6332
https://nvd.nist.gov/vuln/detail/CVE-2006-6332
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6383">
    <Details source="Mitre" xml:lang="en:us">
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a &quot;;&quot; in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6383
https://nvd.nist.gov/vuln/detail/CVE-2006-6383
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6385">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in Intel PRO 10/100, PRO/1000, and PRO/10GbE PCI, PCI-X, and PCIe network adapter drivers (aka NDIS miniport drivers) before 20061205 allows local users to execute arbitrary code with &quot;kernel-level&quot; privileges via an incorrect function call in certain OID handlers.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable. eEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege  Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6385
https://nvd.nist.gov/vuln/detail/CVE-2006-6385
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6493">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the krbv4_ldap_auth function in servers/slapd/kerberos.c in OpenLDAP 2.4.3 and earlier, when OpenLDAP is compiled with the --enable-kbind (Kerberos KBIND) option, allows remote attackers to execute arbitrary code via an LDAP bind request using the LDAP_AUTH_KRBV41 authentication method and long credential data.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 does not support the LDAP_AUTH_KRBV41 authentication method.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6493
https://nvd.nist.gov/vuln/detail/CVE-2006-6493
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6497">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618243" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618243" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the layout engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6497
https://nvd.nist.gov/vuln/detail/CVE-2006-6497
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6498">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618244" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618244" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6498
https://nvd.nist.gov/vuln/detail/CVE-2006-6498
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6501">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618245" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618245" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6501
https://nvd.nist.gov/vuln/detail/CVE-2006-6501
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6502">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618246" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618246" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6502
https://nvd.nist.gov/vuln/detail/CVE-2006-6502
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6503">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618247" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618247" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6503
https://nvd.nist.gov/vuln/detail/CVE-2006-6503
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6504">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="1618248" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618248" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0758">RHSA-2006:0758</Advisory>
        <Package name="firefox">firefox-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6504
https://nvd.nist.gov/vuln/detail/CVE-2006-6504
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6505">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2006-12-19T19:00:00</PublicDate>
    <Bugzilla id="220516" url="https://bugzilla.redhat.com/show_bug.cgi?id=220516" xml:lang="en:us">
seamonkey &lt; 1.0.7 multiple vulnerabilities
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0759">RHSA-2006:0759</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.7-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2006-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2006:0760">RHSA-2006:0760</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.9-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6505
https://nvd.nist.gov/vuln/detail/CVE-2006-6505
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6535">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-14T00:00:00</PublicDate>
    <Bugzilla id="1618249" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618249" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and &quot;node lockups.&quot;  NOTE: it is not clear whether this issue is exploitable.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Kostantin Khorenko for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0014">RHSA-2007:0014</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.8.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6535
https://nvd.nist.gov/vuln/detail/CVE-2006-6535
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6628">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in OpenOffice.org (OOo) 2.1 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted DOC file, as demonstrated by the 12122006-djtest.doc file, a variant of CVE-2006-6561 in a separate codebase.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw a security issue.  This flaw will only crash OpenOffice.org and presents no possibility for arbitrary code execution.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6628
https://nvd.nist.gov/vuln/detail/CVE-2006-6628
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6660">
    <Details source="Mitre" xml:lang="en:us">
The nodeType function in KDE libkhtml 4.2.0 and earlier, as used by Konquerer, KMail, and other programs, allows remote attackers to cause a denial of service (crash) via malformed HTML tags, possibly involving a COL SPAN tag embedded in a RANGE tag.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of KDE as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6660
https://nvd.nist.gov/vuln/detail/CVE-2006-6660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6698">
    <ThreatSeverity>Low</ThreatSeverity>
    <Bugzilla id="219280" url="https://bugzilla.redhat.com/show_bug.cgi?id=219280" xml:lang="en:us">
GConfd uses non-unique directory name in /tmp leading to local DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GConf daemon (gconfd) in GConf 2.14.0 creates temporary files under directories with names based on the username, even when GCONF_GLOBAL_LOCKS is not set, which allows local users to cause a denial of service by creating the directories ahead of time, which prevents other users from using Gnome.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact. The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6698
https://nvd.nist.gov/vuln/detail/CVE-2006-6698
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6719">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-18T00:00:00</PublicDate>
    <Bugzilla id="221459" url="https://bugzilla.redhat.com/show_bug.cgi?id=221459" xml:lang="en:us">
Wget attempts to dereference NULL pointer upon response from malicious FTP server
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as wget to be a security issue.

This flaw was fixed in wget shipped in Red Hat Enterprise Linux 5 before the initial release of the product. Version of wget shipped in Red Hat Enterprise Linux 3 and 4 are affected by this bug.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6719
https://nvd.nist.gov/vuln/detail/CVE-2006-6719
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6731">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-01-04T00:00:00</PublicDate>
    <Bugzilla id="1618250" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618250" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function.  NOTE: some of these details are obtained from third party information.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0073">RHSA-2007:0073</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6731
https://nvd.nist.gov/vuln/detail/CVE-2006-6731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6736">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-04T00:00:00</PublicDate>
    <Bugzilla id="1618251" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618251" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to &quot;access data in other applets,&quot; aka &quot;The second issue.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0073">RHSA-2007:0073</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6736
https://nvd.nist.gov/vuln/detail/CVE-2006-6736
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6737">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-04T00:00:00</PublicDate>
    <Bugzilla id="1618252" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618252" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to &quot;access data in other applets,&quot; aka &quot;The first issue.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0073">RHSA-2007:0073</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6737
https://nvd.nist.gov/vuln/detail/CVE-2006-6737
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6745">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-01-04T00:00:00</PublicDate>
    <Bugzilla id="1618253" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618253" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0062">RHSA-2007:0062</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.7-1jpp.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0073">RHSA-2007:0073</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.3-1jpp.3.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6745
https://nvd.nist.gov/vuln/detail/CVE-2006-6745
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6772">
    <PublicDate>2006-12-25T00:00:00</PublicDate>
    <Bugzilla id="221484" url="https://bugzilla.redhat.com/show_bug.cgi?id=221484" xml:lang="en:us">
CVE-2006-6772 w3m is vulnerable to format string attack via CN field of SSL/TLS certificate when infoked with -dump/-backend
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6772
https://nvd.nist.gov/vuln/detail/CVE-2006-6772
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6811">
    <Details source="Mitre" xml:lang="en:us">
KsIRC 1.3.12 allows remote attackers to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference.  NOTE: this issue was originally reported as a buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as KsIRC to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6811
https://nvd.nist.gov/vuln/detail/CVE-2006-6811
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6899">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-28T00:00:00</PublicDate>
    <Bugzilla id="1618254" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618254" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0065">RHSA-2007:0065</Advisory>
        <Package name="bluez-utils">bluez-utils-0:2.10-2.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6899
https://nvd.nist.gov/vuln/detail/CVE-2006-6899
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6921">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-19T00:00:00</PublicDate>
    <Bugzilla id="302921" url="https://bugzilla.redhat.com/show_bug.cgi?id=302921" xml:lang="en:us">
kernel: denial of service with wedged processes
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-03-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0154">RHSA-2008:0154</Advisory>
        <Package name="kernel">kernel-0:2.6.18-53.1.14.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6921
https://nvd.nist.gov/vuln/detail/CVE-2006-6921
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6939">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-11-11T00:00:00</PublicDate>
    <Bugzilla id="223075" url="https://bugzilla.redhat.com/show_bug.cgi?id=223075" xml:lang="en:us">
CVE-2006-6939 Insecure use of temporary file in ed
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNU ed before 0.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files, possibly in the open_sbuf function.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223072

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6939
https://nvd.nist.gov/vuln/detail/CVE-2006-6939
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-6969">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-11-22T00:00:00</PublicDate>
    <Bugzilla id="2187714" url="https://bugzilla.redhat.com/show_bug.cgi?id=2187714" xml:lang="en:us">
jetty: session identifiers session hijacking
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>4.8</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-340</CWE>
    <Details source="Mitre" xml:lang="en:us">
Jetty before 4.2.27, 5.1 before 5.1.12, 6.0 before 6.0.2, and 6.1 before 6.1.0pre3 generates predictable session identifiers using java.util.random, which makes it easier for remote attackers to guess a session identifier through brute force attacks, bypass authentication requirements, and possibly conduct cross-site request forgery attacks.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in Jetty that could allow a remote attacker to hijack a valid user's session due to a vulnerability in the &quot;java.util.Random&quot; class. When predictable naming patterns are used for session identifiers in Jetty, a remote attacker could hijack a victim's session and gain unauthorized access to the application.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>jetty</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-6969
https://nvd.nist.gov/vuln/detail/CVE-2006-6969
https://www.eclipse.org/jetty/security_reports.php
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7051">
    <Details source="Mitre" xml:lang="en:us">
The sys_timer_create function in posix-timers.c for Linux kernel 2.6.x allows local users to cause a denial of service (memory consumption) and possibly bypass memory limits or cause other processes to be killed by creating a large number of posix timers, which are allocated in kernel memory but are not treated as part of the process' memory.
    </Details>
    <Statement xml:lang="en:us">
This issue can only be exploited if pending signals (ulimit -i) is set to &quot;unlimited&quot;. In case of Red Hat Enterprise Linux version 2.1, 3 and 4 this is not the case and therefore they are not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7051
https://nvd.nist.gov/vuln/detail/CVE-2006-7051
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7098">
    <Details source="Mitre" xml:lang="en:us">
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue was specific to a Debian patch to Apache HTTP Server.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7098
https://nvd.nist.gov/vuln/detail/CVE-2006-7098
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7108">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-01-09T00:00:00</PublicDate>
    <Bugzilla id="1618255" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618255" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
login in util-linux-2.12a skips pam_acct_mgmt and chauth_tok when authentication is skipped, such as when a Kerberos krlogin session has been established, which might allow users to bypass intended access policies that would be enforced by pam_acct_mgmt and chauth_tok.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

This flaw has been rated as having a low  severity by the Red Hat Security Response Team.  More information about this rating can be found here:
http://www.redhat.com/security/updates/classification/

This flaw is currently being tracked via the following bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=231449
https://bugzilla.redhat.com/show_bug.cgi?id=231448

The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 and 3 which are in maintenance mode.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0235">RHSA-2007:0235</Advisory>
        <Package name="util-linux">util-linux-0:2.12a-16.EL4.25</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7108
https://nvd.nist.gov/vuln/detail/CVE-2006-7108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7139">
    <Details source="Mitre" xml:lang="en:us">
Kmail 1.9.1 on KDE 3.5.2, with &quot;Prefer HTML to Plain Text&quot; enabled, allows remote attackers to cause a denial of service (crash) via an HTML e-mail with certain table and frameset tags that trigger a segmentation fault, possibly involving invalid free or delete operations.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Our testing found that this issue did not affect the versions of Kmail as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7139
https://nvd.nist.gov/vuln/detail/CVE-2006-7139
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7175">
    <Bugzilla id="172352" url="https://bugzilla.redhat.com/show_bug.cgi?id=172352" xml:lang="en:us">
Sendmail allows SSLv2 during STARTTLS, and the CipherList config option isn't supported so you can't turn it off
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
    </Details>
    <Statement xml:lang="en:us">
** DISPUTED ** Sendmail classes the CipherList directive as &quot;for future release&quot;; currently unsupported and undocumented. Therefore the lack of support for the CipherList directive in various Red Hat products is not a vulnerability.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7175
https://nvd.nist.gov/vuln/detail/CVE-2006-7175
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7176">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2005-10-26T00:00:00</PublicDate>
    <Bugzilla id="238540" url="https://bugzilla.redhat.com/show_bug.cgi?id=238540" xml:lang="en:us">
sendmail allows external mail with from address xxx@localhost.localdomain
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the &quot;localhost.localdomain&quot; domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0252">RHSA-2007:0252</Advisory>
        <Package name="sendmail">sendmail-0:8.13.1-3.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-03-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0237">RHSA-2010:0237</Advisory>
        <Package name="sendmail">sendmail-0:8.13.8-8.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7176
https://nvd.nist.gov/vuln/detail/CVE-2006-7176
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7177">
    <Details source="Mitre" xml:lang="en:us">
MadWifi, when Ad-Hoc mode is used, allows remote attackers to cause a denial of service (system crash) via unspecified vectors that lead to a kernel panic in the ieee80211_input function, related to &quot;packets coming from a 'malicious' WinXP system.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7177
https://nvd.nist.gov/vuln/detail/CVE-2006-7177
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7178">
    <Details source="Mitre" xml:lang="en:us">
MadWifi before 0.9.3 does not properly handle reception of an AUTH frame by an IBSS node, which allows remote attackers to cause a denial of service (system crash) via a certain AUTH frame.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7178
https://nvd.nist.gov/vuln/detail/CVE-2006-7178
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7179">
    <Details source="Mitre" xml:lang="en:us">
ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7179
https://nvd.nist.gov/vuln/detail/CVE-2006-7179
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7180">
    <Details source="Mitre" xml:lang="en:us">
ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7180
https://nvd.nist.gov/vuln/detail/CVE-2006-7180
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7195">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-19T00:00:00</PublicDate>
    <Bugzilla id="237081" url="https://bugzilla.redhat.com/show_bug.cgi?id=237081" xml:lang="en:us">
tomcat XSS in example webapps
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows remote attackers to inject arbitrary web script or HTML via certain header values.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:1.1-8jpp.1.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7195
https://nvd.nist.gov/vuln/detail/CVE-2006-7195
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7196">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-26T00:00:00</PublicDate>
    <Bugzilla id="238131" url="https://bugzilla.redhat.com/show_bug.cgi?id=238131" xml:lang="en:us">
tomcat XSS in example webapps
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors.  NOTE: this may be related to CVE-2006-0254.1.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7196
https://nvd.nist.gov/vuln/detail/CVE-2006-7196
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7197">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-03-05T00:00:00</PublicDate>
    <Bugzilla id="430642" url="https://bugzilla.redhat.com/show_bug.cgi?id=430642" xml:lang="en:us">
mod_jk chunk too long
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The AJP connector in Apache Tomcat 5.5.15 uses an incorrect length for chunks, which can cause a buffer over-read in the ajp_process_callback in mod_jk, which allows remote attackers to read portions of sensitive memory.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7197
https://nvd.nist.gov/vuln/detail/CVE-2006-7197
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7203">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-15T00:00:00</PublicDate>
    <Bugzilla id="239767" url="https://bugzilla.redhat.com/show_bug.cgi?id=239767" xml:lang="en:us">
oops in compat_sys_mount() when data pointer is NULL
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode (&quot;mount -t smbfs&quot;).
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank SWsoft Virtuozzo/OpenVZ Linux kernel team for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0376">RHSA-2007:0376</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7203
https://nvd.nist.gov/vuln/detail/CVE-2006-7203
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7204">
    <Details source="Mitre" xml:lang="en:us">
The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7204
https://nvd.nist.gov/vuln/detail/CVE-2006-7204
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7205">
    <Bugzilla id="241640" url="https://bugzilla.redhat.com/show_bug.cgi?id=241640" xml:lang="en:us">
php array_fill memory consumption
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The array_fill function in ext/standard/array.c in PHP 4.4.2 and 5.1.2 allows context-dependent attackers to cause a denial of service (memory consumption) via a large num value.
    </Details>
    <Statement xml:lang="en:us">
The memory_limit configuration option is used to constrain the amount of memory which a script can consume during execution. If this setting is disabled (or set unreasonably high), it is expected behaviour that scripts will be able to consume large amounts of memory during script execution.

The memory_limit setting is enabled by default in all versions of PHP distributed in Red Hat Enterprise Linux and Application Stack.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7205
https://nvd.nist.gov/vuln/detail/CVE-2006-7205
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7221">
    <PublicDate>2006-02-13T00:00:00</PublicDate>
    <Bugzilla id="251681" url="https://bugzilla.redhat.com/show_bug.cgi?id=251681" xml:lang="en:us">
fsplib single zero byte overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one errors in fsplib.c in fsplib before 0.8 allow attackers to cause a denial of service via unspecified vectors involving the (1) name and (2) d_name entry attributes.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user assisted client crash such as this to be a security flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7221
https://nvd.nist.gov/vuln/detail/CVE-2006-7221
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7224">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="373021" url="https://bugzilla.redhat.com/show_bug.cgi?id=373021" xml:lang="en:us">
pcre multiple integer overflows
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Red Hat" xml:lang="en:us">
No description is available for this CVE.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7224
https://nvd.nist.gov/vuln/detail/CVE-2006-7224
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7225">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-13T00:00:00</PublicDate>
    <Bugzilla id="384761" url="https://bugzilla.redhat.com/show_bug.cgi?id=384761" xml:lang="en:us">
pcre miscalculation of memory requirements for malformed Posix character class
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a &quot;malformed POSIX character class&quot;, as demonstrated via an invalid character after a [[ sequence.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ludwig Nussel for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1068">RHSA-2007:1068</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_6.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1059">RHSA-2007:1059</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7225
https://nvd.nist.gov/vuln/detail/CVE-2006-7225
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7226">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-13T00:00:00</PublicDate>
    <Bugzilla id="384781" url="https://bugzilla.redhat.com/show_bug.cgi?id=384781" xml:lang="en:us">
pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified &quot;subpattern containing a named recursion or subroutine reference,&quot; which allows context-dependent attackers to cause a denial of service (error or crash).
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ludwig Nussel for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1068">RHSA-2007:1068</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_6.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1059">RHSA-2007:1059</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7226
https://nvd.nist.gov/vuln/detail/CVE-2006-7226
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7227">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="383341" url="https://bugzilla.redhat.com/show_bug.cgi?id=383341" xml:lang="en:us">
pcre integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to execute arbitrary code via a regular expression containing a large number of named subpatterns (name_count) or long subpattern names (max_name_size), which triggers a buffer overflow.  NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1052">RHSA-2007:1052</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_5.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1052">RHSA-2007:1052</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7227
https://nvd.nist.gov/vuln/detail/CVE-2006-7227
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7228">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="383371" url="https://bugzilla.redhat.com/show_bug.cgi?id=383371" xml:lang="en:us">
pcre integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227.  NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1065">RHSA-2007:1065</Advisory>
        <Package name="pcre">pcre-0:3.4-2.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1077">RHSA-2007:1077</Advisory>
        <Package name="python">python-0:1.5.2-43.72.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0546">RHSA-2008:0546</Advisory>
        <Package name="php">php-0:4.1.2-2.20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1063">RHSA-2007:1063</Advisory>
        <Package name="pcre">pcre-0:3.9-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.2.3-6.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1068">RHSA-2007:1068</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_6.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.3.4-14.4.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1059">RHSA-2007:1059</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7228
https://nvd.nist.gov/vuln/detail/CVE-2006-7228
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7230">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-20T00:00:00</PublicDate>
    <Bugzilla id="384801" url="https://bugzilla.redhat.com/show_bug.cgi?id=384801" xml:lang="en:us">
pcre miscalculation of memory requirements if options are changed during pattern compilation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ludwig Nussel for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1068">RHSA-2007:1068</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_6.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1059">RHSA-2007:1059</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7230
https://nvd.nist.gov/vuln/detail/CVE-2006-7230
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7232">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-09-16T00:00:00</PublicDate>
    <Bugzilla id="434264" url="https://bugzilla.redhat.com/show_bug.cgi?id=434264" xml:lang="en:us">
mysql: daemon crash via EXPLAIN on queries on information schema
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the MySQL packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 as they did not support INFORMATION_SCHEMA, introduced in MySQL version 5.

The MySQL packages as shipped in Red Hat Application Stack v1 and v2 are based on upstream version which has the fix included.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7232
https://nvd.nist.gov/vuln/detail/CVE-2006-7232
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7234">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-10-03T00:00:00</PublicDate>
    <Bugzilla id="214205" url="https://bugzilla.redhat.com/show_bug.cgi?id=214205" xml:lang="en:us">
lynx: .mailcap and .mime.types files read from CWD
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.4</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0965">RHSA-2008:0965</Advisory>
        <Package name="lynx">lynx-0:2.8.4-18.1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0965">RHSA-2008:0965</Advisory>
        <Package name="lynx">lynx-0:2.8.5-11.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0965">RHSA-2008:0965</Advisory>
        <Package name="lynx">lynx-0:2.8.5-18.2.el4_7.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-10-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0965">RHSA-2008:0965</Advisory>
        <Package name="lynx">lynx-0:2.8.5-28.1.el5_2.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7234
https://nvd.nist.gov/vuln/detail/CVE-2006-7234
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7236">
    <Details source="Mitre" xml:lang="en:us">
The default configuration of xterm on Debian GNU/Linux sid and possibly Ubuntu enables the allowWindowOps resource, which allows user-assisted attackers to execute arbitrary code or have unspecified other impact via escape sequences.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of the xterm package, as shipped with Red Hat Enterprise Linux 3, 4, and 5, and the version of the XFree86 (providing xterm) and hanterm-xf packages, as shipped with Red Hat Enterprise Linux 2.1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7236
https://nvd.nist.gov/vuln/detail/CVE-2006-7236
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7239">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-08-12T00:00:00</PublicDate>
    <Bugzilla id="595229" url="https://bugzilla.redhat.com/show_bug.cgi?id=595229" xml:lang="en:us">
gnutls: unknown hash algorithm NULL pointer derefence [GNUTLS-SA-2006-2]
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>3.5</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:S/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL pointer dereference.
    </Details>
    <Statement xml:lang="en:us">
This issue was addressed in Red Hat Enterprise Linux 5 via RHBA-2012:0319: https://rhn.redhat.com/errata/RHBA-2012-0319.html

It did not affect versions of gnutls as shipped with Red Hat Enterprise Linux 4 and 6.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2012-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2012:0319">RHBA-2012:0319</Advisory>
        <Package name="gnutls">gnutls-0:1.4.1-7.el5_8.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gnutls</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gnutls</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7239
https://nvd.nist.gov/vuln/detail/CVE-2006-7239
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7240">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-04-29T00:00:00</PublicDate>
    <Bugzilla id="632973" url="https://bugzilla.redhat.com/show_bug.cgi?id=632973" xml:lang="en:us">
gnome-power-manager: Screen not locked on resume from hibernate / suspend
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.6</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
gnome-power-manager 2.14.0 does not properly implement the lock_on_suspend and lock_on_hibernate settings for locking the screen when the suspend or hibernate button is pressed, which might make it easier for physically proximate attackers to access an unattended laptop via a resume action, a related issue to CVE-2010-2532.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Affected</FixState>
        <PackageName>gnome-power-manager</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7240
https://nvd.nist.gov/vuln/detail/CVE-2006-7240
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7243">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-18T00:00:00</PublicDate>
    <Bugzilla id="662707" url="https://bugzilla.redhat.com/show_bug.cgi?id=662707" xml:lang="en:us">
php: paths with NULL character were considered valid
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.0</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-626</CWE>
    <Details source="Mitre" xml:lang="en:us">
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2013-09-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2013:1307">RHSA-2013:1307</Advisory>
        <Package name="php53">php53-0:5.3.3-21.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2014-03-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2014:0311">RHSA-2014:0311</Advisory>
        <Package name="php">php-0:5.1.6-44.el5_10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <ReleaseDate>2013-11-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2013:1615">RHSA-2013:1615</Advisory>
        <Package name="php">php-0:5.3.3-26.el6</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>php</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7243
https://nvd.nist.gov/vuln/detail/CVE-2006-7243
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7244">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2009-08-01T00:00:00</PublicDate>
    <Bugzilla id="690200" url="https://bugzilla.redhat.com/show_bug.cgi?id=690200" xml:lang="en:us">
libpng: Memory leak by write of iCCP chunk with negative embedded profile length (CVE-2006-7244, CVE-2009-5063)
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-401</CWE>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in pngwutil.c in libpng 1.2.13beta1, and other versions before 1.2.15beta3, allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length.
    </Details>
    <Statement xml:lang="en:us">
These flaws do not affect any version of libpng shipped with Red Hat Enterprise Linux.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libpng10</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libpng</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libpng</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7244
https://nvd.nist.gov/vuln/detail/CVE-2006-7244
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7246">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-05-10T00:00:00</PublicDate>
    <Bugzilla id="756418" url="https://bugzilla.redhat.com/show_bug.cgi?id=756418" xml:lang="en:us">
(WPA-Enterprise): Verify that the certificate is from trusted CA and matches the specified subject
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>4.0</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>NetworkManager</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Under investigation</FixState>
        <PackageName>wpa_supplicant</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Affected</FixState>
        <PackageName>NetworkManager</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Affected</FixState>
        <PackageName>wpa_supplicant</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Affected</FixState>
        <PackageName>NetworkManager</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Affected</FixState>
        <PackageName>wpa_supplicant</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7246
https://nvd.nist.gov/vuln/detail/CVE-2006-7246
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7248">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-29T00:00:00</PublicDate>
    <Bugzilla id="798100" url="https://bugzilla.redhat.com/show_bug.cgi?id=798100" xml:lang="en:us">
openssl: mime_hdr_cmp NULL dereference crash
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>5.0</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:L/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-476</CWE>
    <Details source="Red Hat" xml:lang="en:us">
No description is available for this CVE.
    </Details>
    <Statement xml:lang="en:us">
This issue was corrected in Red Hat Enterprise Linux 5 via RHSA-2009:1335. It did not affect openssl packages shipped with Red Hat Enterprise Linux 6.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl096b</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl097a</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:1">
        <ProductName>Red Hat JBoss Enterprise Web Server 1</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7248
https://nvd.nist.gov/vuln/detail/CVE-2006-7248
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7250">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-08-29T00:00:00</PublicDate>
    <Bugzilla id="798100" url="https://bugzilla.redhat.com/show_bug.cgi?id=798100" xml:lang="en:us">
openssl: mime_hdr_cmp NULL dereference crash
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.0</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:L/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </Details>
    <Statement xml:lang="en:us">
This issue was corrected in Red Hat Enterprise Linux 5 via RHSA-2009:1335. It did not affect openssl packages shipped with Red Hat Enterprise Linux 6.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-09-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1335">RHSA-2009:1335</Advisory>
        <Package name="openssl">openssl-0:0.9.8e-12.el5</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl096b</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>openssl097a</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl098e</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_web_server:1">
        <ProductName>Red Hat JBoss Enterprise Web Server 1</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>openssl</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7250
https://nvd.nist.gov/vuln/detail/CVE-2006-7250
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-7254">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-03-31T00:00:00</PublicDate>
    <Bugzilla id="1698738" url="https://bugzilla.redhat.com/show_bug.cgi?id=1698738" xml:lang="en:us">
glibc: Not closing unhadleable client sockets due to nscd daemon leads to DoS.
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-400</CWE>
    <Details source="Mitre" xml:lang="en:us">
The nscd daemon in the GNU C Library (glibc) before version 2.5 does not close incoming client sockets if they cannot be handled by the daemon, allowing local users to carry out a denial of service attack on the daemon.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>glibc</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-7254
https://nvd.nist.gov/vuln/detail/CVE-2006-7254
https://sourceware.org/bugzilla/show_bug.cgi?id=2498
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-10002">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2026-03-19T11:03:46</PublicDate>
    <Bugzilla id="2449001" url="https://bugzilla.redhat.com/show_bug.cgi?id=2449001" xml:lang="en:us">
perl-xml-parser: XML::Parser for Perl: Heap corruption and denial of service from crafted XML input
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>6.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-131</CWE>
    <Details source="Mitre" xml:lang="en:us">
XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in XML::Parser for Perl. This vulnerability allows an attacker to cause a heap corruption, which can lead to a denial of service (DoS) by crashing the application. The issue occurs when the software processes specially crafted XML input, causing an internal buffer to overflow. This overflow can corrupt memory, leading to instability and application termination.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
    </Mitigation>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:10.1">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7680">RHSA-2026:7680</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.47-6.1.el10_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7681">RHSA-2026:7681</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.44-12.el8_10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7679">RHSA-2026:7679</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.46-9.1.el9_7</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Affected</FixState>
        <PackageName>perl-XML-Parser</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Affected</FixState>
        <PackageName>perl-XML-Parser</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-10002
https://nvd.nist.gov/vuln/detail/CVE-2006-10002
https://github.com/cpan-authors/XML-Parser/commit/6b291f4d260fc124a6ec80382b87a918f372bc6b.patch
https://github.com/cpan-authors/XML-Parser/issues/64
https://rt.cpan.org/Ticket/Display.html?id=19859
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-10003">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2026-03-19T11:08:04</PublicDate>
    <Bugzilla id="2448999" url="https://bugzilla.redhat.com/show_bug.cgi?id=2448999" xml:lang="en:us">
perl-xml-parser: XML::Parser: Memory corruption via deeply nested XML files
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>8.8</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.

In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer.

The bug can be observed when parsing an XML file with very deep element nesting
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in XML::Parser, a Perl module for parsing XML. This vulnerability, an off-by-one heap buffer overflow, occurs when processing an XML file with very deep element nesting. A remote attacker could exploit this by providing a specially crafted XML file, potentially leading to memory corruption.
    </Details>
    <Mitigation xml:lang="en:us">
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
    </Mitigation>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:10.1">
        <ProductName>Red Hat Enterprise Linux 10</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7680">RHSA-2026:7680</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.47-6.1.el10_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7681">RHSA-2026:7681</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.44-12.el8_10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2026-04-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2026:7679">RHSA-2026:7679</Advisory>
        <Package name="perl-XML-Parser">perl-XML-Parser-0:2.46-9.1.el9_7</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>perl-XML-Parser</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Affected</FixState>
        <PackageName>perl-XML-Parser</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-10003
https://nvd.nist.gov/vuln/detail/CVE-2006-10003
https://github.com/cpan-authors/XML-Parser/commit/3eb9cc95420fa0c3f76947c4708962546bf27cfd.patch
https://github.com/cpan-authors/XML-Parser/issues/39
https://rt.cpan.org/Ticket/Display.html?id=19860
    </References>
</Vulnerability>

<Vulnerability name="CVE-2006-20001">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2023-01-17T00:00:00</PublicDate>
    <Bugzilla id="2161774" url="https://bugzilla.redhat.com/show_bug.cgi?id=2161774" xml:lang="en:us">
httpd: mod_dav: out-of-bounds read/write of zero byte
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>7.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-787</CWE>
    <Details source="Mitre" xml:lang="en:us">
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.

This issue affects Apache HTTP Server 2.4.54 and earlier.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in the mod_dav module of httpd. A specially crafted &quot;If:&quot; request header can cause a memory read or write of a single zero byte due to a missing error check, resulting in a Denial of Service.
    </Details>
    <Statement xml:lang="en:us">
This flaw only affects configurations with mod_dav loaded and configured. Also, if there is no WebDAV repository configured, the server is not affected and no further mitigation is needed. For more information about the mitigation, check the mitigation section below.

The httpd mod_dav module is enabled by default on Red Hat Enterprise Linux 6, 7, 8, 9, and in RHSCL. However, there is no WebDAV repository configured by default.

This flaw has been rated as having a security impact of moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 7. Red Hat Enterprise Linux 7 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata.
    </Statement>
    <Mitigation xml:lang="en:us">
Disabling mod_dav and restarting httpd will mitigate this flaw.
    </Mitigation>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_core_services:1">
        <ProductName>JBCS httpd 2.4.51.sp2</ProductName>
        <ReleaseDate>2023-06-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:3355">RHSA-2023:3355</Advisory>
        <Package name="httpd">httpd</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_core_services:1::el8">
        <ProductName>JBoss Core Services for RHEL 8</ProductName>
        <ReleaseDate>2023-06-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:3354">RHSA-2023:3354</Advisory>
        <Package name="jbcs-httpd24-httpd">jbcs-httpd24-httpd-0:2.4.51-39.el8jbcs</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_core_services:1::el7">
        <ProductName>JBoss Core Services on RHEL 7</ProductName>
        <ReleaseDate>2023-06-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:3354">RHSA-2023:3354</Advisory>
        <Package name="jbcs-httpd24-httpd">jbcs-httpd24-httpd-0:2.4.51-39.el7jbcs</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:0852">RHSA-2023:0852</Advisory>
        <Package name="httpd:2.4">httpd:2.4-8070020230131172653.bd1311ed</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:0970">RHSA-2023:0970</Advisory>
        <Package name="httpd">httpd-0:2.4.53-7.el9_1.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:jboss_enterprise_application_platform:6">
        <ProductName>Red Hat JBoss Enterprise Application Platform 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>httpd22</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:rhel_software_collections:3">
        <ProductName>Red Hat Software Collections</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>httpd24-httpd</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2006-20001
https://nvd.nist.gov/vuln/detail/CVE-2006-20001
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2006-20001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0001">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-20T00:00:00</PublicDate>
    <Bugzilla id="1618257" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618257" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not cause the watch on the old inode to be dropped.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0085">RHSA-2007:0085</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.10.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0001
https://nvd.nist.gov/vuln/detail/CVE-2007-0001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0002">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-16T00:00:00</PublicDate>
    <Bugzilla id="222808" url="https://bugzilla.redhat.com/show_bug.cgi?id=222808" xml:lang="en:us">
buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions.  NOTE: the integer overflow has been split into CVE-2007-1466.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Fridrich Štrba and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0055">RHSA-2007:0055</Advisory>
        <Package name="libwpd">libwpd-0:0.8.7-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0002
https://nvd.nist.gov/vuln/detail/CVE-2007-0002
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0003">
    <Details source="Mitre" xml:lang="en:us">
pam_unix.so in Linux-PAM 0.99.7.0 allows context-dependent attackers to log into accounts whose password hash, as stored in /etc/passwd or /etc/shadow, has only two characters.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of pam as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0003
https://nvd.nist.gov/vuln/detail/CVE-2007-0003
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0005">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-06T00:00:00</PublicDate>
    <Bugzilla id="1618258" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618258" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the (1) read and (2) write handlers in the Omnikey CardMan 4040 driver in the Linux kernel before 2.6.21-rc3 allow local users to gain privileges.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Daniel Roethlisberger for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0099">RHSA-2007:0099</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0005
https://nvd.nist.gov/vuln/detail/CVE-2007-0005
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0006">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-12-21T00:00:00</PublicDate>
    <Bugzilla id="1618259" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618259" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as &quot;spinlock CPU recursion.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0085">RHSA-2007:0085</Advisory>
        <Package name="kernel">kernel-0:2.6.9-42.0.10.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0099">RHSA-2007:0099</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0006
https://nvd.nist.gov/vuln/detail/CVE-2007-0006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0008">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="565576" url="https://bugzilla.redhat.com/show_bug.cgi?id=565576" xml:lang="en:us">
NSS: SSLv2 protocol buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the &quot;Master Secret&quot;, which results in a heap-based overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0008
https://nvd.nist.gov/vuln/detail/CVE-2007-0008
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0009">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="565576" url="https://bugzilla.redhat.com/show_bug.cgi?id=565576" xml:lang="en:us">
NSS: SSLv2 protocol buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid &quot;Client Master Key&quot; length values.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0009
https://nvd.nist.gov/vuln/detail/CVE-2007-0009
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0010">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-10T00:00:00</PublicDate>
    <Bugzilla id="1618260" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618260" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0019">RHSA-2007:0019</Advisory>
        <Package name="gtk2">gtk2-0:2.4.13-22</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0010
https://nvd.nist.gov/vuln/detail/CVE-2007-0010
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0012">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2008-01-08T00:00:00</PublicDate>
    <Bugzilla id="428244" url="https://bugzilla.redhat.com/show_bug.cgi?id=428244" xml:lang="en:us">
J2RE DoS with undefined name attribute
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sun JRE 5.0 before update 14 allows remote attackers to cause a denial of service (Internet Explorer crash) via an object tag with an encoded applet and an undefined name attribute, which triggers a NULL pointer dereference in jpiexp32.dll when the applet is decoded and passed to the JVM.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0012
https://nvd.nist.gov/vuln/detail/CVE-2007-0012
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0044">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-03T00:00:00</PublicDate>
    <Bugzilla id="223113" url="https://bugzilla.redhat.com/show_bug.cgi?id=223113" xml:lang="en:us">
Acrobat Reader Universal CSRF and session riding
    </Bugzilla>
    <CWE>CWE-352</CWE>
    <Details source="Mitre" xml:lang="en:us">
Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka &quot;Universal CSRF and session riding.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0144">RHSA-2008:0144</Advisory>
        <Package name="acroread">acroread-0:8.1.2-1.el3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2008-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0144">RHSA-2008:0144</Advisory>
        <Package name="acroread">acroread-0:8.1.2-1.el4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0144">RHSA-2008:0144</Advisory>
        <Package name="acroread">acroread-0:8.1.2-1.el5.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0044
https://nvd.nist.gov/vuln/detail/CVE-2007-0044
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0045">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-03T00:00:00</PublicDate>
    <Bugzilla id="1618261" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618261" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka &quot;Universal XSS (UXSS).&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.1.1.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-atk">acroread-libs-atk-0:1.8.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-glib2">acroread-libs-glib2-0:2.4.7-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2">acroread-libs-gtk2-0:2.4.13-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2-engines">acroread-libs-gtk2-engines-0:2.2.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-pango">acroread-libs-pango-0:1.6.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0017">RHSA-2007:0017</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.2.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0045
https://nvd.nist.gov/vuln/detail/CVE-2007-0045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0046">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-01-03T00:00:00</PublicDate>
    <Bugzilla id="1618262" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618262" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.1.1.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-atk">acroread-libs-atk-0:1.8.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-glib2">acroread-libs-glib2-0:2.4.7-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2">acroread-libs-gtk2-0:2.4.13-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-gtk2-engines">acroread-libs-gtk2-engines-0:2.2.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-01-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0021">RHSA-2007:0021</Advisory>
        <Package name="acroread-libs-pango">acroread-libs-pango-0:1.6.0-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0017">RHSA-2007:0017</Advisory>
        <Package name="acroread">acroread-0:7.0.9-1.2.0.EL4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0046
https://nvd.nist.gov/vuln/detail/CVE-2007-0046
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0061">
    <Details source="Mitre" xml:lang="en:us">
The DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed packet that triggers &quot;corrupt stack memory.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of dhcp as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0061
https://nvd.nist.gov/vuln/detail/CVE-2007-0061
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0062">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="339561" url="https://bugzilla.redhat.com/show_bug.cgi?id=339561" xml:lang="en:us">
dhcpd possible DoS via large max-message-size option
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact. The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1, 3, 4, or 5:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-0062
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0062
https://nvd.nist.gov/vuln/detail/CVE-2007-0062
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0063">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-08T00:00:00</PublicDate>
    <Bugzilla id="1618264" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618264" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed DHCP packet that triggers a stack-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
This issue is the same as CVE-2007-5365.  The affected dhcp versions were fixed via: https://rhn.redhat.com/errata/RHSA-2007-0970.html
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0970">RHSA-2007:0970</Advisory>
        <Package name="dhcp">dhcp-1:2.0pl5-11</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0063
https://nvd.nist.gov/vuln/detail/CVE-2007-0063
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0071">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2008-04-08T00:00:00</PublicDate>
    <Bugzilla id="440684" url="https://bugzilla.redhat.com/show_bug.cgi?id=440684" xml:lang="en:us">
Flash Player input validation error
    </Bugzilla>
    <CWE>CWE-20</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0221">RHSA-2008:0221</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.124.0-1.el3.with.oss</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2008-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0221">RHSA-2008:0221</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.124.0-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-04-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0221">RHSA-2008:0221</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.124.0-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0071
https://nvd.nist.gov/vuln/detail/CVE-2007-0071
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0080">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the SMB_Connect_Server function in FreeRadius 1.1.3 and earlier allows attackers to execute arbitrary code related to the server desthost field of an SMB_Handle_Type instance.  NOTE: the impact of this issue has been disputed by a reliable third party and the vendor, who states that exploitation is limited &quot;only to local administrators who have write access to the server configuration files.&quot;  CVE concurs with the dispute
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  The affected code is in an optional module that is not shipped in Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0080
https://nvd.nist.gov/vuln/detail/CVE-2007-0080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0086">
    <Details source="Mitre" xml:lang="en:us">
The Apache HTTP Server, when accessed through a TCP connection with a large window size, allows remote attackers to cause a denial of service (network bandwidth consumption) via a Range header that specifies multiple copies of the same fragment.  NOTE: the severity of this issue has been disputed by third parties, who state that the large window size required by the attack is not normally supported or configured by the server, or that a DDoS-style attack would accomplish the same goal
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability.  The pottential attacker has to send acknowledgement packets periodically to make server generate traffic.  Exactly the same effect could be achieved by simply downloading the file.  The statement that setting the TCP window size to arbitrarily high value would permit the attacker to disconnect and stop sending ACKs is false, because Red Hat Enterprise Linux limits the size of the TCP send buffer to 4MB by default.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0086
https://nvd.nist.gov/vuln/detail/CVE-2007-0086
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0103">
    <Bugzilla id="428125" url="https://bugzilla.redhat.com/show_bug.cgi?id=428125" xml:lang="en:us">
acroread infinite loop DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Adobe PDF specification 1.3, as implemented by Adobe Acrobat before 8.0.0, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
    </Details>
    <Statement xml:lang="en:us">
Some implementations of the PDF specification erroneously allow page tree objects that refer back to themselves. As a result, an infinite loop could be created. We believe this could only result in a denial of service against the application. We do not consider a user-assisted DoS of a client application to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0103
https://nvd.nist.gov/vuln/detail/CVE-2007-0103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0104">
    <Bugzilla id="428126" url="https://bugzilla.redhat.com/show_bug.cgi?id=428126" xml:lang="en:us">
xpdf infinite loop DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
    </Details>
    <Statement xml:lang="en:us">
Not Vulnerable. This flaw is the result of an infinite recursion flaw in xpdf, which cannot result in arbitrary code execution.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0104
https://nvd.nist.gov/vuln/detail/CVE-2007-0104
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0157">
    <Details source="Mitre" xml:lang="en:us">
Array index error in the uri_lookup function in the URI parser for neon 0.26.0 to 0.26.2, possibly only on 64-bit platforms, allows remote malicious servers to cause a denial of service (crash) via a URI with non-ASCII characters, which triggers a buffer under-read due to a type conversion error that generates a negative index.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue does not affect the older versions of neon as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.  This issue also does not affect the older versions of neon included in the cadaver package.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0157
https://nvd.nist.gov/vuln/detail/CVE-2007-0157
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0227">
    <Details source="Mitre" xml:lang="en:us">
slocate 3.1 does not properly manage database entries that specify names of files in protected directories, which allows local users to obtain the names of private files.  NOTE: another researcher reports that the issue is not present in slocate 2.7.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of slocate as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0227
https://nvd.nist.gov/vuln/detail/CVE-2007-0227
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0235">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-14T00:00:00</PublicDate>
    <Bugzilla id="222637" url="https://bugzilla.redhat.com/show_bug.cgi?id=222637" xml:lang="en:us">
Stack overflow libgtop when pathname of mmap()-ed file is too long
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of libgtop as shipped with Red Hat Enterprise Linux 2.1 or 3.

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

This flaw affects Red Hat Enterprise Linux 4 and is being tracked via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=249884
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0765">RHSA-2007:0765</Advisory>
        <Package name="libgtop2">libgtop2-0:2.8.0-1.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0235
https://nvd.nist.gov/vuln/detail/CVE-2007-0235
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0238">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618265" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618265" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank John Heasman for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-38.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-10.6.0.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0069">RHSA-2007:0069</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.17.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0238
https://nvd.nist.gov/vuln/detail/CVE-2007-0238
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0239">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618266" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618266" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-38.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-10.6.0.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0069">RHSA-2007:0069</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.17.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0239
https://nvd.nist.gov/vuln/detail/CVE-2007-0239
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0240">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618268" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618268" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Zope 2.10.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors in a HTTP GET request.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect Zope included within the conga package shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_cluster:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0331">RHBA-2007:0331</Advisory>
        <Package name="conga">conga-0:0.9.2-6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0240
https://nvd.nist.gov/vuln/detail/CVE-2007-0240
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0242">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-29T00:00:00</PublicDate>
    <Bugzilla id="234633" url="https://bugzilla.redhat.com/show_bug.cgi?id=234633" xml:lang="en:us">
QT UTF8 improper character expansion
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:2.3.1-14.EL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.1.2-17.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.3.3-13.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.3.6-23.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2011-09-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2011:1324">RHSA-2011:1324</Advisory>
        <Package name="qt4">qt4-0:4.2.1-1.el5_7.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0242
https://nvd.nist.gov/vuln/detail/CVE-2007-0242
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0243">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-17T00:00:00</PublicDate>
    <Bugzilla id="325941" url="https://bugzilla.redhat.com/show_bug.cgi?id=325941" xml:lang="en:us">
java-jre: GIF buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0166">RHSA-2007:0166</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.8-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0166">RHSA-2007:0166</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.8-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0167">RHSA-2007:0167</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.4-1jpp.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-01-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0072">RHSA-2007:0072</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0166">RHSA-2007:0166</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.8-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0167">RHSA-2007:0167</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.4-1jpp.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0243
https://nvd.nist.gov/vuln/detail/CVE-2007-0243
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0245">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-12T00:00:00</PublicDate>
    <Bugzilla id="242004" url="https://bugzilla.redhat.com/show_bug.cgi?id=242004" xml:lang="en:us">
openoffice.org rtf filter buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in OpenOffice.org (OOo) 2.2.1 and earlier allows remote attackers to execute arbitrary code via a RTF file with a crafted prtdata tag with a length parameter inconsistency, which causes vtable entries to be overwritten.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0406">RHSA-2007:0406</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-39.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0406">RHSA-2007:0406</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-10.6.0.1.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0406">RHSA-2007:0406</Advisory>
        <Package name="openoffice.org2">openoffice.org2-1:2.0.4-5.7.0.1.0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0406">RHSA-2007:0406</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.17.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0245
https://nvd.nist.gov/vuln/detail/CVE-2007-0245
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0247">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-13T00:00:00</PublicDate>
    <Bugzilla id="222883" url="https://bugzilla.redhat.com/show_bug.cgi?id=222883" xml:lang="en:us">
CVE-2007-0247 Squid crashes when receiving certain FTP listings
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
squid/src/ftp.c in Squid before 2.6.STABLE7 allows remote FTP servers to cause a denial of service (core dump) via crafted FTP directory listing responses, possibly related to the (1) ftpListingFinish and (2) ftpHtmlifyListEntry functions.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0247
https://nvd.nist.gov/vuln/detail/CVE-2007-0247
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0248">
    <Details source="Mitre" xml:lang="en:us">
The aclMatchExternal function in Squid before 2.6.STABLE7 allows remote attackers to cause a denial of service (crash) by causing an external_acl queue overload, which triggers an infinite loop.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

This issue did not affect the versions of Squid as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0248
https://nvd.nist.gov/vuln/detail/CVE-2007-0248
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0448">
    <Details source="Mitre" xml:lang="en:us">
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0448
https://nvd.nist.gov/vuln/detail/CVE-2007-0448
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0450">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-14T00:00:00</PublicDate>
    <Bugzilla id="237080" url="https://bugzilla.redhat.com/show_bug.cgi?id=237080" xml:lang="en:us">
tomcat directory traversal
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) &quot;/&quot; (slash), (2) &quot;\&quot; (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:1.1-8jpp.1.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0360">RHSA-2007:0360</Advisory>
        <Package name="jbossas">jbossas-0:4.0.5-2.CP04.el4s1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0450
https://nvd.nist.gov/vuln/detail/CVE-2007-0450
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0451">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-13T00:00:00</PublicDate>
    <Bugzilla id="1618365" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618365" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache SpamAssassin before 3.1.8 allows remote attackers to cause a denial of service via long URLs in malformed HTML, which triggers &quot;massive memory usage.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0074">RHSA-2007:0074</Advisory>
        <Package name="spamassassin">spamassassin-0:3.1.8-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0075">RHSA-2007:0075</Advisory>
        <Package name="spamassassin">spamassassin-0:3.1.8-2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0451
https://nvd.nist.gov/vuln/detail/CVE-2007-0451
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0452">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-05T00:00:00</PublicDate>
    <Bugzilla id="1618269" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618269" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0060">RHSA-2007:0060</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0060">RHSA-2007:0060</Advisory>
        <Package name="samba">samba-0:3.0.10-1.4E.11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0061">RHSA-2007:0061</Advisory>
        <Package name="samba">samba-0:3.0.23c-2.el5.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0452
https://nvd.nist.gov/vuln/detail/CVE-2007-0452
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0453">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect Linux versions of Samba.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0453
https://nvd.nist.gov/vuln/detail/CVE-2007-0453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0454">
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues affect the AFS ACL module which is not distributed with Samba in Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0454
https://nvd.nist.gov/vuln/detail/CVE-2007-0454
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0455">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-01-26T00:00:00</PublicDate>
    <Bugzilla id="224607" url="https://bugzilla.redhat.com/show_bug.cgi?id=224607" xml:lang="en:us">
gd: buffer overrun
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=234312

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0153">RHSA-2007:0153</Advisory>
        <Package name="php">php-0:5.1.6-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0162">RHSA-2007:0162</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.6</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0455
https://nvd.nist.gov/vuln/detail/CVE-2007-0455
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0456">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="227140" url="https://bugzilla.redhat.com/show_bug.cgi?id=227140" xml:lang="en:us">
Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the LLT dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-AS21.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0456
https://nvd.nist.gov/vuln/detail/CVE-2007-0456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0457">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="227140" url="https://bugzilla.redhat.com/show_bug.cgi?id=227140" xml:lang="en:us">
Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the IEEE 802.11 dissector in Wireshark (formerly Ethereal) 0.10.14 through 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-AS21.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0457
https://nvd.nist.gov/vuln/detail/CVE-2007-0457
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0458">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="227140" url="https://bugzilla.redhat.com/show_bug.cgi?id=227140" xml:lang="en:us">
Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 and 0.99.4 allows remote attackers to cause a denial of service (application crash) via unspecified vectors, a different issue than CVE-2006-5468.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-AS21.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0458
https://nvd.nist.gov/vuln/detail/CVE-2007-0458
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0459">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-01T00:00:00</PublicDate>
    <Bugzilla id="227140" url="https://bugzilla.redhat.com/show_bug.cgi?id=227140" xml:lang="en:us">
Multiple Wireshark issues (CVE-2007-0457, CVE-2007-0458, CVE-2007-0459)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-AS21.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0066">RHSA-2007:0066</Advisory>
        <Package name="wireshark">wireshark-0:0.99.5-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0459
https://nvd.nist.gov/vuln/detail/CVE-2007-0459
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0469">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2009-07-21T00:00:00</PublicDate>
    <Bugzilla id="513048" url="https://bugzilla.redhat.com/show_bug.cgi?id=513048" xml:lang="en:us">
RubyGems: Specially-crafted Gem archive can overwrite system files
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>5.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:S/C:N/I:P/A:C</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The extract_files function in installer.rb in RubyGems before 0.9.1 does not check whether files exist before overwriting them, which allows user-assisted remote attackers to overwrite arbitrary files, cause a denial of service, or execute arbitrary code via crafted GEM packages.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>rubygems</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0469
https://nvd.nist.gov/vuln/detail/CVE-2007-0469
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0493">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-01-25T00:00:00</PublicDate>
    <Bugzilla id="230003" url="https://bugzilla.redhat.com/show_bug.cgi?id=230003" xml:lang="en:us">
bind use-after-free
    </Bugzilla>
    <CWE>CWE-416</CWE>
    <Details source="Mitre" xml:lang="en:us">
Use-after-free vulnerability in ISC BIND 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (named daemon crash) via unspecified vectors that cause named to &quot;dereference a freed fetch context.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of ISC BIND as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0057">RHSA-2007:0057</Advisory>
        <Package name="bind">bind-30:9.3.3-8.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0493
https://nvd.nist.gov/vuln/detail/CVE-2007-0493
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0494">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-01-25T00:00:00</PublicDate>
    <Bugzilla id="225268" url="https://bugzilla.redhat.com/show_bug.cgi?id=225268" xml:lang="en:us">
BIND dnssec denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and 9.5.0a1 (Bind Forum only) allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the &quot;DNSSEC Validation&quot; vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0044">RHSA-2007:0044</Advisory>
        <Package name="bind">bind-0:9.2.1-8.EL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0044">RHSA-2007:0044</Advisory>
        <Package name="bind">bind-20:9.2.4-20.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0044">RHSA-2007:0044</Advisory>
        <Package name="bind">bind-20:9.2.4-24.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0057">RHSA-2007:0057</Advisory>
        <Package name="bind">bind-30:9.3.3-8.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0494
https://nvd.nist.gov/vuln/detail/CVE-2007-0494
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0537">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-01-24T00:00:00</PublicDate>
    <Bugzilla id="229606" url="https://bugzilla.redhat.com/show_bug.cgi?id=229606" xml:lang="en:us">
konqueror XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0537
https://nvd.nist.gov/vuln/detail/CVE-2007-0537
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0555">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-05T00:00:00</PublicDate>
    <Bugzilla id="1618367" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618367" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0064">RHSA-2007:0064</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.18-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0064">RHSA-2007:0064</Advisory>
        <Package name="postgresql">postgresql-0:7.4.16-1.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0068">RHSA-2007:0068</Advisory>
        <Package name="postgresql">postgresql-0:8.1.8-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0067">RHSA-2007:0067</Advisory>
        <Package name="postgresql">postgresql-0:8.1.7-3.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0555
https://nvd.nist.gov/vuln/detail/CVE-2007-0555
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0556">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-05T00:00:00</PublicDate>
    <Bugzilla id="1618270" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618270" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a &quot;previously made query plan,&quot; which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an &quot;ALTER COLUMN TYPE&quot; SQL statement, which can be leveraged to read arbitrary memory from the server.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0068">RHSA-2007:0068</Advisory>
        <Package name="postgresql">postgresql-0:8.1.8-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0067">RHSA-2007:0067</Advisory>
        <Package name="postgresql">postgresql-0:8.1.7-3.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0556
https://nvd.nist.gov/vuln/detail/CVE-2007-0556
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0650">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the open_sty function in mkind.c for makeindex 2.14 in teTeX might allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename.  NOTE: other overflows exist but might not be exploitable, such as a heap-based overflow in the check_idx function.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability.  The user would have to voluntarily interact with the attack mechanism to exploit the flaw, and the result would be the ability to run code as themselves.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0650
https://nvd.nist.gov/vuln/detail/CVE-2007-0650
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0653">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-21T00:00:00</PublicDate>
    <Bugzilla id="228013" url="https://bugzilla.redhat.com/show_bug.cgi?id=228013" xml:lang="en:us">
XMMS multiple issues (CVE-2007-0654)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team has rated this issue as having low security impact. There are no longer plans to fix this flaw in Red Hat Enterprise Linux 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>xmms</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0653
https://nvd.nist.gov/vuln/detail/CVE-2007-0653
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0654">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-21T00:00:00</PublicDate>
    <Bugzilla id="228013" url="https://bugzilla.redhat.com/show_bug.cgi?id=228013" xml:lang="en:us">
XMMS multiple issues (CVE-2007-0654)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team has rated this issue as having low security impact. There are no longer plans to fix this flaw in Red Hat Enterprise Linux 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>xmms</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0654
https://nvd.nist.gov/vuln/detail/CVE-2007-0654
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0720">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-13T00:00:00</PublicDate>
    <Bugzilla id="1618271" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618271" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a &quot;partially-negotiated&quot; SSL connection, which prevents other requests from being accepted.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0123">RHSA-2007:0123</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.42</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0123">RHSA-2007:0123</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0123">RHSA-2007:0123</Advisory>
        <Package name="cups">cups-1:1.2.4-11.5.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0720
https://nvd.nist.gov/vuln/detail/CVE-2007-0720
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0770">
    <Bugzilla id="228758" url="https://bugzilla.redhat.com/show_bug.cgi?id=228758" xml:lang="en:us">
CVE-2007-0770: GraphicsMagick buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in GraphicsMagick and ImageMagick allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c. NOTE: this issue is due to an incomplete patch for CVE-2006-5456.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Red Hat did not ship the incomplete patch for CVE-2006-5456 and is therefore not affected by this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0770
https://nvd.nist.gov/vuln/detail/CVE-2007-0770
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0771">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-12T00:00:00</PublicDate>
    <Bugzilla id="227952" url="https://bugzilla.redhat.com/show_bug.cgi?id=227952" xml:lang="en:us">
Tracing execution of a threaded executable causes kernel BUG report
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to &quot;MT exec + utrace_attach spin failure mode,&quot; as demonstrated by ptrace-thrash.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0169">RHSA-2007:0169</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0771
https://nvd.nist.gov/vuln/detail/CVE-2007-0771
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0773">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-22T00:00:00</PublicDate>
    <Bugzilla id="243252" url="https://bugzilla.redhat.com/show_bug.cgi?id=243252" xml:lang="en:us">
lost fput in a 32-bit ioctl on 64-bit x86 systems
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the SWsoft Virtuozzo/OpenVZ Linux kernel team for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0773
https://nvd.nist.gov/vuln/detail/CVE-2007-0773
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0774">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-27T00:00:00</PublicDate>
    <Bugzilla id="1618272" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618272" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0096">RHSA-2007:0096</Advisory>
        <Package name="mod_jk">mod_jk-0:1.2.20-1.el4s1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-04-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0164">RHSA-2007:0164</Advisory>
        <Package name="mod_jk">mod_jk-0:1.2.20-1jpp_1rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0774
https://nvd.nist.gov/vuln/detail/CVE-2007-0774
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0775">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618273" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618273" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0775
https://nvd.nist.gov/vuln/detail/CVE-2007-0775
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0777">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618275" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618275" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0777
https://nvd.nist.gov/vuln/detail/CVE-2007-0777
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0778">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618276" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618276" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0778
https://nvd.nist.gov/vuln/detail/CVE-2007-0778
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0779">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618277" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618277" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0779
https://nvd.nist.gov/vuln/detail/CVE-2007-0779
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0780">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618278" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618278" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0780
https://nvd.nist.gov/vuln/detail/CVE-2007-0780
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0800">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618279" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618279" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0800
https://nvd.nist.gov/vuln/detail/CVE-2007-0800
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0822">
    <Details source="Mitre" xml:lang="en:us">
umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability.  On Red Hat Enterprise Linux  processes that change their effective UID do not dump core by default when they receive a fatal signal.  Therefore the NULL pointer dereference does not lead to an information leak.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0822
https://nvd.nist.gov/vuln/detail/CVE-2007-0822
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0823">
    <Details source="Mitre" xml:lang="en:us">
xterm on Slackware Linux 10.2 stores information that had been displayed for a different user account using the same xterm process, which might allow local users to bypass file permissions and read other users' files, or obtain other sensitive information, by reading the xterm process memory.  NOTE: it could be argued that this is an expected consequence of multiple users sharing the same interactive process, in which case this is not a vulnerability.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this issue to be a security vulnerability. It is correct and expected behavior for xterm not to zero-fill its scrollback buffer upon reception of terminal clear excape sequence.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0823
https://nvd.nist.gov/vuln/detail/CVE-2007-0823
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0844">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-11-07T00:00:00</PublicDate>
    <Bugzilla id="430487" url="https://bugzilla.redhat.com/show_bug.cgi?id=430487" xml:lang="en:us">
pam_ssh permits authentication with arbitrary string if a passphrase-less key exists
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The auth_via_key function in pam_ssh.c in pam_ssh before 1.92, when the allow_blank_passphrase option is disabled, allows remote attackers to bypass authentication restrictions and use private encryption keys requiring a blank passphrase by entering a non-blank passphrase.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0844
https://nvd.nist.gov/vuln/detail/CVE-2007-0844
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0905">
    <Bugzilla id="240155" url="https://bugzilla.redhat.com/show_bug.cgi?id=240155" xml:lang="en:us">
php session extension safe_mode/open_basedir bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension.  NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0905
https://nvd.nist.gov/vuln/detail/CVE-2007-0905
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0906">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618280" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618280" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0906
https://nvd.nist.gov/vuln/detail/CVE-2007-0906
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0907">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618281" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618281" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0907
https://nvd.nist.gov/vuln/detail/CVE-2007-0907
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0908">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618282" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618282" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0908
https://nvd.nist.gov/vuln/detail/CVE-2007-0908
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0909">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618283" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618283" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0909
https://nvd.nist.gov/vuln/detail/CVE-2007-0909
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0910">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618284" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618284" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in PHP before 5.2.1 allows attackers to &quot;clobber&quot; certain super-global variables via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0910
https://nvd.nist.gov/vuln/detail/CVE-2007-0910
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0911">
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw is a regression of the fix for CVE-2007-0906 affecting PHP version 5.2.1 only which results in any use of str_replace() causing a crash regardless of user input.  These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0911
https://nvd.nist.gov/vuln/detail/CVE-2007-0911
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0956">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="229782" url="https://bugzilla.redhat.com/show_bug.cgi?id=229782" xml:lang="en:us">
Unauthorized access via krb5-telnet daemon
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.2-44</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.7-61</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.3.4-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.5-23</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0956
https://nvd.nist.gov/vuln/detail/CVE-2007-0956
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0957">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="231528" url="https://bugzilla.redhat.com/show_bug.cgi?id=231528" xml:lang="en:us">
krb5_klog_syslog() stack buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense and the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.2-44</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.7-61</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.3.4-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.5-23</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0957
https://nvd.nist.gov/vuln/detail/CVE-2007-0957
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0958">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-01-26T00:00:00</PublicDate>
    <Bugzilla id="243256" url="https://bugzilla.redhat.com/show_bug.cgi?id=243256" xml:lang="en:us">
core-dumping unreadable binaries via PT_INTERP
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0099">RHSA-2007:0099</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0958
https://nvd.nist.gov/vuln/detail/CVE-2007-0958
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0981">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="229253" url="https://bugzilla.redhat.com/show_bug.cgi?id=229253" xml:lang="en:us">
: seamonkey cookie setting / same-domain bypass vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0981
https://nvd.nist.gov/vuln/detail/CVE-2007-0981
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0988">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="1618285" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618285" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an &quot;a:2147483649:{&quot; argument.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0988
https://nvd.nist.gov/vuln/detail/CVE-2007-0988
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0994">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-03-05T00:00:00</PublicDate>
    <Bugzilla id="1618286" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618286" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in Mozilla Firefox 2.x before 2.0.0.2 and 1.x before 1.5.0.10, and SeaMonkey 1.1 before 1.1.1 and 1.0 before 1.0.8, allows remote attackers to execute arbitrary JavaScript as the user via an HTML mail message with a javascript: URI in an (1) img, (2) link, or (3) style tag, which bypasses the access checks and executes code with chrome privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0994
https://nvd.nist.gov/vuln/detail/CVE-2007-0994
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0995">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618287" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618287" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0995
https://nvd.nist.gov/vuln/detail/CVE-2007-0995
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0996">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618288" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618288" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="devhelp">devhelp-0:0.12-10.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0097">RHSA-2007:0097</Advisory>
        <Package name="yelp">yelp-0:2.16.0-14.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0996
https://nvd.nist.gov/vuln/detail/CVE-2007-0996
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0998">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-14T00:00:00</PublicDate>
    <Bugzilla id="230295" url="https://bugzilla.redhat.com/show_bug.cgi?id=230295" xml:lang="en:us">
HVM guest VNC server allows compromise of entire host OS by any VNC console user
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The VNC server implementation in QEMU, as used by Xen and possibly other environments, allows local users of a guest operating system to read arbitrary files on the host operating system via unspecified vectors related to QEMU monitor mode, as demonstrated by mapping files to a CDROM device.  NOTE: some of these details are obtained from third party information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0114">RHSA-2007:0114</Advisory>
        <Package name="xen">xen-0:3.0.3-25.0.3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0998
https://nvd.nist.gov/vuln/detail/CVE-2007-0998
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-0999">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-03-14T00:00:00</PublicDate>
    <Bugzilla id="1618289" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618289" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in Ekiga 2.0.3, and probably other versions, allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2007-1006.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0087">RHSA-2007:0087</Advisory>
        <Package name="ekiga">ekiga-0:2.0.2-7.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-0999
https://nvd.nist.gov/vuln/detail/CVE-2007-0999
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1000">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-06T00:00:00</PublicDate>
    <Bugzilla id="1618290" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618290" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ipv6_getsockopt_sticky function in net/ipv6/ipv6_sockglue.c in the Linux kernel before 2.6.20.2 allows local users to read arbitrary kernel memory via certain getsockopt calls that trigger a NULL dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0169">RHSA-2007:0169</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1000
https://nvd.nist.gov/vuln/detail/CVE-2007-1000
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1001">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-10T00:00:00</PublicDate>
    <Bugzilla id="1618291" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618291" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
    </Details>
    <Statement xml:lang="en:us">
This issue was fixed in php package updates for Red Hat Enterprise Linux and Red Hat Application Stack:
http://rhn.redhat.com/cve/CVE-2007-1001.html

This issue did not affect the versions of gd as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0153">RHSA-2007:0153</Advisory>
        <Package name="php">php-0:5.1.6-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0162">RHSA-2007:0162</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1001
https://nvd.nist.gov/vuln/detail/CVE-2007-1001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1002">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-28T00:00:00</PublicDate>
    <Bugzilla id="233587" url="https://bugzilla.redhat.com/show_bug.cgi?id=233587" xml:lang="en:us">
evolution format string flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the write_html function in calendar/gui/e-cal-component-memo-preview.c in Evolution Shared Memo 2.8.2.1, and possibly earlier versions, allows user-assisted remote attackers to execute arbitrary code via format specifiers in the categories of a crafted shared memo.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ulf Härnhammar (Secunia Research) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0158">RHSA-2007:0158</Advisory>
        <Package name="evolution">evolution-0:2.8.0-33.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1002
https://nvd.nist.gov/vuln/detail/CVE-2007-1002
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1003">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="235263" url="https://bugzilla.redhat.com/show_bug.cgi?id=235263" xml:lang="en:us">
xserver XC-MISC integer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-82.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-120.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0126">RHSA-2007:0126</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0127">RHSA-2007:0127</Advisory>
        <Package name="xorg-x11-server">xorg-x11-server-0:1.1.1-48.13.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1003
https://nvd.nist.gov/vuln/detail/CVE-2007-1003
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1006">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-13T00:00:00</PublicDate>
    <Bugzilla id="229259" url="https://bugzilla.redhat.com/show_bug.cgi?id=229259" xml:lang="en:us">
Ekiga format string flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in the gm_main_window_flash_message function in Ekiga before 2.0.5 allow attackers to cause a denial of service and possibly execute arbitrary code via a crafted Q.931 SETUP packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0087">RHSA-2007:0087</Advisory>
        <Package name="ekiga">ekiga-0:2.0.2-7.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1006
https://nvd.nist.gov/vuln/detail/CVE-2007-1006
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1007">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-13T00:00:00</PublicDate>
    <Bugzilla id="1618292" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618292" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0086">RHSA-2007:0086</Advisory>
        <Package name="gnomemeeting">gnomemeeting-0:0.96.0-5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0086">RHSA-2007:0086</Advisory>
        <Package name="gnomemeeting">gnomemeeting-0:1.0.2-9</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1007
https://nvd.nist.gov/vuln/detail/CVE-2007-1007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1030">
    <Bugzilla id="229990" url="https://bugzilla.redhat.com/show_bug.cgi?id=229990" xml:lang="en:us">
CVE-2007-1030: libevent &lt; 1.3 DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect versions of libevent as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1030
https://nvd.nist.gov/vuln/detail/CVE-2007-1030
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1036">
    <Details source="Mitre" xml:lang="en:us">
The default configuration of JBoss does not restrict access to the (1) console and (2) web management interfaces, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
    </Details>
    <Statement xml:lang="en:us">
The JBoss AS console manager should always be secured prior to deployment, as directed in the JBoss Application Server Guide and release notes. By default, the JBoss AS installer gives users the ability to password protect the console manager. If the user did not use the installer, the raw JBoss services will be in a completely unconfigured state and these steps should be performed manually:
http://wiki.jboss.org/wiki/Wiki.jsp?page=SecureJBoss
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1036
https://nvd.nist.gov/vuln/detail/CVE-2007-1036
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1092">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618293" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618293" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.0.9 and 2.0.0.1, and SeaMonkey before 1.0.8 allow remote attackers to execute arbitrary code via JavaScript onUnload handlers that modify the structure of a document, wich triggers memory corruption due to the lack of a finalize hook on DOM window objects.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0079">RHSA-2007:0079</Advisory>
        <Package name="firefox">firefox-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1092
https://nvd.nist.gov/vuln/detail/CVE-2007-1092
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1095">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-23T00:00:00</PublicDate>
    <Bugzilla id="1618294" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618294" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.6.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-6.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-5.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1095
https://nvd.nist.gov/vuln/detail/CVE-2007-1095
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1199">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-28T00:00:00</PublicDate>
    <Bugzilla id="231055" url="https://bugzilla.redhat.com/show_bug.cgi?id=231055" xml:lang="en:us">
file: // URL execution
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Adobe Reader and Acrobat Trial allow remote attackers to read arbitrary files via a file:// URI in a PDF document, as demonstrated with &lt;&lt;/URI(file:///C:/)/S/URI&gt;&gt;, a different issue than CVE-2007-0045.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1199
https://nvd.nist.gov/vuln/detail/CVE-2007-1199
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1216">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="231537" url="https://bugzilla.redhat.com/show_bug.cgi?id=231537" xml:lang="en:us">
krb5 double free flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an &quot;an invalid direction encoding&quot;.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank the MIT Kerberos project for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.2-44</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.2.7-61</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.3.4-46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0095">RHSA-2007:0095</Advisory>
        <Package name="krb5">krb5-0:1.5-23</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1216
https://nvd.nist.gov/vuln/detail/CVE-2007-1216
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1217">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-14T00:00:00</PublicDate>
    <Bugzilla id="402741" url="https://bugzilla.redhat.com/show_bug.cgi?id=402741" xml:lang="en:us">
Kernel: CAPI overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0672">RHSA-2007:0672</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.72</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0673">RHSA-2007:0673</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.65</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0671">RHSA-2007:0671</Advisory>
        <Package name="kernel">kernel-0:2.4.21-51.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0774">RHSA-2007:0774</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.6.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1217
https://nvd.nist.gov/vuln/detail/CVE-2007-1217
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1218">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-01T00:00:00</PublicDate>
    <Bugzilla id="232347" url="https://bugzilla.redhat.com/show_bug.cgi?id=232347" xml:lang="en:us">
tcpdump denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one buffer overflow in the parse_elements function in the 802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier allows remote attackers to cause a denial of service (crash) via a crafted 802.11 frame.  NOTE: this was originally referred to as heap-based, but it might be stack-based.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232347

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0387">RHSA-2007:0387</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0368">RHSA-2007:0368</Advisory>
        <Package name="tcpdump">tcpdump-14:3.9.4-11.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1218
https://nvd.nist.gov/vuln/detail/CVE-2007-1218
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1262">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-09T00:00:00</PublicDate>
    <Bugzilla id="239647" url="https://bugzilla.redhat.com/show_bug.cgi?id=239647" xml:lang="en:us">
XSS through HTML message in squirrelmail
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-6.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1262
https://nvd.nist.gov/vuln/detail/CVE-2007-1262
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1263">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-05T00:00:00</PublicDate>
    <Bugzilla id="430489" url="https://bugzilla.redhat.com/show_bug.cgi?id=430489" xml:lang="en:us">
gnupg/gpgme signed message spoofing
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Core Security Technologies for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0106">RHSA-2007:0106</Advisory>
        <Package name="gnupg">gnupg-0:1.0.7-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0106">RHSA-2007:0106</Advisory>
        <Package name="gnupg">gnupg-0:1.2.1-20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0106">RHSA-2007:0106</Advisory>
        <Package name="gnupg">gnupg-0:1.2.6-9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0107">RHSA-2007:0107</Advisory>
        <Package name="gnupg">gnupg-0:1.4.5-13</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1263
https://nvd.nist.gov/vuln/detail/CVE-2007-1263
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1282">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-03-05T00:00:00</PublicDate>
    <Bugzilla id="1618295" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618295" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0077">RHSA-2007:0077</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.8-0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0078">RHSA-2007:0078</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0108">RHSA-2007:0108</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.10-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1282
https://nvd.nist.gov/vuln/detail/CVE-2007-1282
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1285">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-01T00:00:00</PublicDate>
    <Bugzilla id="1618296" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618296" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0154">RHSA-2007:0154</Advisory>
        <Package name="php">php-0:4.1.2-2.17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0162">RHSA-2007:0162</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0163">RHSA-2007:0163</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-15</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1285
https://nvd.nist.gov/vuln/detail/CVE-2007-1285
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1286">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-02T00:00:00</PublicDate>
    <Bugzilla id="1618297" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618297" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in PHP 4.4.4 and earlier allows remote context-dependent attackers to execute arbitrary code via a long string to the unserialize function, which triggers the overflow in the ZVAL reference counter.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0154">RHSA-2007:0154</Advisory>
        <Package name="php">php-0:4.1.2-2.17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0163">RHSA-2007:0163</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-15</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1286
https://nvd.nist.gov/vuln/detail/CVE-2007-1286
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1287">
    <Details source="Mitre" xml:lang="en:us">
A regression error in the phpinfo function in PHP 4.4.3 to 4.4.6, and PHP 6.0 in CVS, allows remote attackers to conduct cross-site scripting (XSS) attacks via GET, POST, or COOKIE array values, which are not escaped in the phpinfo output, as originally fixed for CVE-2005-3388.
    </Details>
    <Statement xml:lang="en:us">
The phpinfo function should not be used in publically-accessible PHP scripts.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1287
https://nvd.nist.gov/vuln/detail/CVE-2007-1287
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1308">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-04T00:00:00</PublicDate>
    <Bugzilla id="299891" url="https://bugzilla.redhat.com/show_bug.cgi?id=299891" xml:lang="en:us">
kdelibs KDE JavaScript denial of service (crash)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ecma/kjs_html.cpp in KDE JavaScript (KJS), as used in Konqueror in KDE 3.5.5, allows remote attackers to cause a denial of service (crash) by accessing the content of an iframe with an ftp:// URI in the src attribute, probably due to a NULL pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1308
https://nvd.nist.gov/vuln/detail/CVE-2007-1308
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1320">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-20T00:00:00</PublicDate>
    <Bugzilla id="237342" url="https://bugzilla.redhat.com/show_bug.cgi?id=237342" xml:lang="en:us">
xen/qemu Cirrus LGD-54XX &quot;bitblt&quot; Heap Overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to &quot;attempting to mark non-existent regions as dirty,&quot; aka the &quot;bitblt&quot; heap overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0323">RHSA-2007:0323</Advisory>
        <Package name="xen">xen-0:3.0.3-25.0.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1320
https://nvd.nist.gov/vuln/detail/CVE-2007-1320
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1321">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-04-20T00:00:00</PublicDate>
    <Bugzilla id="237343" url="https://bugzilla.redhat.com/show_bug.cgi?id=237343" xml:lang="en:us">
xen QEMU NE2000 emulation issues
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 &quot;receive&quot; integer signedness error. NOTE: this identifier was inadvertently used by some sources to cover multiple issues that were labeled &quot;NE2000 network driver and the socket code,&quot; but separate identifiers have been created for the individual vulnerabilities since there are sometimes different fixes; see CVE-2007-5729 and CVE-2007-5730.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0323">RHSA-2007:0323</Advisory>
        <Package name="xen">xen-0:3.0.3-25.0.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1321
https://nvd.nist.gov/vuln/detail/CVE-2007-1321
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1322">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-20T00:00:00</PublicDate>
    <Bugzilla id="237345" url="https://bugzilla.redhat.com/show_bug.cgi?id=237345" xml:lang="en:us">
xen icebp instruction issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
QEMU 0.8.2 allows local users to halt a virtual machine by executing the icebp instruction.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect Xen as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1322
https://nvd.nist.gov/vuln/detail/CVE-2007-1322
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1349">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-22T00:00:00</PublicDate>
    <Bugzilla id="240423" url="https://bugzilla.redhat.com/show_bug.cgi?id=240423" xml:lang="en:us">
mod_perl PerlRun denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0486">RHSA-2007:0486</Advisory>
        <Package name="mod_perl">mod_perl-0:1.26-8.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0395">RHSA-2007:0395</Advisory>
        <Package name="mod_perl">mod_perl-0:1.99_09-12.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0395">RHSA-2007:0395</Advisory>
        <Package name="mod_perl">mod_perl-0:1.99_16-4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0395">RHSA-2007:0395</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-6.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.1::el4">
        <ProductName>Red Hat Network Proxy v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0627">RHSA-2008:0627</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-06-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0396">RHSA-2007:0396</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.3-1.el4s1.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1349
https://nvd.nist.gov/vuln/detail/CVE-2007-1349
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1351">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="235265" url="https://bugzilla.redhat.com/show_bug.cgi?id=235265" xml:lang="en:us">
Multiple font integer overflows (CVE-2007-1352)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-82.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-120.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0150">RHSA-2007:0150</Advisory>
        <Package name="freetype">freetype-0:2.1.4-6.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0126">RHSA-2007:0126</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0150">RHSA-2007:0150</Advisory>
        <Package name="freetype">freetype-0:2.1.9-5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0132">RHSA-2007:0132</Advisory>
        <Package name="libXfont">libXfont-0:1.2.2-1.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0150">RHSA-2007:0150</Advisory>
        <Package name="freetype">freetype-0:2.2.1-17.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1351
https://nvd.nist.gov/vuln/detail/CVE-2007-1351
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1352">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="235265" url="https://bugzilla.redhat.com/show_bug.cgi?id=235265" xml:lang="en:us">
Multiple font integer overflows (CVE-2007-1352)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-82.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-120.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0126">RHSA-2007:0126</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0132">RHSA-2007:0132</Advisory>
        <Package name="libXfont">libXfont-0:1.2.2-1.0.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1352
https://nvd.nist.gov/vuln/detail/CVE-2007-1352
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1353">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-04-18T00:00:00</PublicDate>
    <Bugzilla id="243259" url="https://bugzilla.redhat.com/show_bug.cgi?id=243259" xml:lang="en:us">
Bluetooth setsockopt() information leaks
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Ilja van Sprundel for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0672">RHSA-2007:0672</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.72</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0673">RHSA-2007:0673</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.65</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-08-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0671">RHSA-2007:0671</Advisory>
        <Package name="kernel">kernel-0:2.4.21-51.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0376">RHSA-2007:0376</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1353
https://nvd.nist.gov/vuln/detail/CVE-2007-1353
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1354">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-04-15T00:00:00</PublicDate>
    <Bugzilla id="1618298" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618298" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Access Control functionality (JMXOpsAccessControlFilter) in JMX Console in JBoss Application Server 4.0.2 and 4.0.5 before 20070416 uses a member variable to store the roles of the current user, which allows remote authenticated administrators to trigger a race condition and gain privileges by logging in during a session by a more privileged administrator, as demonstrated by privilege escalation from Read Mode to Write Mode.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_application_server:4">
        <ProductName>JBoss Application Server 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0151">RHSA-2007:0151</Advisory>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1354
https://nvd.nist.gov/vuln/detail/CVE-2007-1354
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1355">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-19T00:00:00</PublicDate>
    <Bugzilla id="253166" url="https://bugzilla.redhat.com/show_bug.cgi?id=253166" xml:lang="en:us">
tomcat XSS in samples
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in the appdev/sample/web/hello.jsp example application in Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.23, and 6.0.0 through 6.0.10 allow remote attackers to inject arbitrary web script or HTML via the test parameter and unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1355
https://nvd.nist.gov/vuln/detail/CVE-2007-1355
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1358">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-06T00:00:00</PublicDate>
    <Bugzilla id="244803" url="https://bugzilla.redhat.com/show_bug.cgi?id=244803" xml:lang="en:us">
tomcat accept-language xss flaw
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted &quot;Accept-Language headers that do not conform to RFC 2616&quot;.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0328">RHSA-2007:0328</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:1.1-8jpp.1.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0327">RHSA-2007:0327</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0360">RHSA-2007:0360</Advisory>
        <Package name="jbossas">jbossas-0:4.0.5-2.CP04.el4s1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1358
https://nvd.nist.gov/vuln/detail/CVE-2007-1358
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1362">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-31T00:00:00</PublicDate>
    <Bugzilla id="241840" url="https://bugzilla.redhat.com/show_bug.cgi?id=241840" xml:lang="en:us">
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka &quot;Path Abuse in Cookies.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1362
https://nvd.nist.gov/vuln/detail/CVE-2007-1362
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1366">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-20T00:00:00</PublicDate>
    <Bugzilla id="296251" url="https://bugzilla.redhat.com/show_bug.cgi?id=296251" xml:lang="en:us">
xen aam instruction crash
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by &quot;aam 0x0,&quot; which triggers a divide-by-zero error.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect Xen as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1366
https://nvd.nist.gov/vuln/detail/CVE-2007-1366
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1375">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this flaw to be a security issue as it is only exploitable by the script author. No trust boundary is crossed.

This flaw exists in versions of PHP as shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack 1.

These issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, Stronghold 4.0, or Red Hat Application Stack 2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1375
https://nvd.nist.gov/vuln/detail/CVE-2007-1375
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1376">
    <Bugzilla id="240161" url="https://bugzilla.redhat.com/show_bug.cgi?id=240161" xml:lang="en:us">
php shmop argument validation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1376
https://nvd.nist.gov/vuln/detail/CVE-2007-1376
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1378">
    <Details source="Mitre" xml:lang="en:us">
The ovrimos_longreadlen function in the Ovrimos extension for PHP before 4.4.5 allows context-dependent attackers to write to arbitrary memory locations via the result_id and length arguments.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1378
https://nvd.nist.gov/vuln/detail/CVE-2007-1378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1379">
    <Details source="Mitre" xml:lang="en:us">
The ovrimos_close function in the Ovrimos extension for PHP before 4.4.5 can trigger efree of an arbitrary address, which might allow context-dependent attackers to execute arbitrary code.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1379
https://nvd.nist.gov/vuln/detail/CVE-2007-1379
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1380">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="240157" url="https://bugzilla.redhat.com/show_bug.cgi?id=240157" xml:lang="en:us">
php session extension information leak
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
    </Details>
    <Statement xml:lang="en:us">
Our previous fixes for CVE-2007-0906 included a patch that also addressed the issue now given CVE name CVE-2007-1380.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1380
https://nvd.nist.gov/vuln/detail/CVE-2007-1380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1381">
    <Details source="Mitre" xml:lang="en:us">
The wddx_deserialize function in wddx.c 1.119.2.10.2.12 and 1.119.2.10.2.13 in PHP 5, as modified in CVS on 20070224 and fixed on 20070304, calls strlcpy where strlcat was intended and uses improper arguments, which allows context-dependent attackers to execute arbitrary code via a WDDX packet with a malformed overlap of a STRING element, which triggers a buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1381
https://nvd.nist.gov/vuln/detail/CVE-2007-1381
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1383">
    <Bugzilla id="240158" url="https://bugzilla.redhat.com/show_bug.cgi?id=240158" xml:lang="en:us">
php variable counter integer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1383
https://nvd.nist.gov/vuln/detail/CVE-2007-1383
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1388">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-08T00:00:00</PublicDate>
    <Bugzilla id="1618299" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618299" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero option length or invalid option value, which triggers a NULL pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0169">RHSA-2007:0169</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1388
https://nvd.nist.gov/vuln/detail/CVE-2007-1388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1396">
    <Details source="Mitre" xml:lang="en:us">
The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact.  NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this to be a security vulnerability.  Using import_request_variables() is generally a discouraged practice and it is improper use that can lead to security problems, not flaw of PHP itself.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1396
https://nvd.nist.gov/vuln/detail/CVE-2007-1396
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1399">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the zip:// URL wrapper in PECL ZIP 1.8.3 and earlier, as bundled with PHP 5.2.0 and 5.2.1, allows remote attackers to execute arbitrary code via a long zip:// URL, as demonstrated by actively triggering URL access from a remote PHP interpreter via avatar upload or blog pingback.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The zip extension was not shipped in versions of PHP  provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1399
https://nvd.nist.gov/vuln/detail/CVE-2007-1399
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1401">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the crack extension (CrackLib), as bundled with PHP 4.4.6 and other versions before 5.0.0, might allow local users to gain privileges via a long argument to the crack_opendict function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include Cracklib support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1401
https://nvd.nist.gov/vuln/detail/CVE-2007-1401
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1411">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include mssql support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1411
https://nvd.nist.gov/vuln/detail/CVE-2007-1411
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1412">
    <Details source="Mitre" xml:lang="en:us">
The cpdf_open function in the ClibPDF (cpdf) extension in PHP 4.4.6 allows context-dependent attackers to obtain sensitive information (script source code) via a long string in the second argument.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include ClibPDF support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1412
https://nvd.nist.gov/vuln/detail/CVE-2007-1412
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1413">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id).
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The php-snmp package as shipped with Red Hat Enterprise Linux 4 and 5 use net-snmp which is not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1413
https://nvd.nist.gov/vuln/detail/CVE-2007-1413
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1420">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-09T00:00:00</PublicDate>
    <Bugzilla id="232603" url="https://bugzilla.redhat.com/show_bug.cgi?id=232603" xml:lang="en:us">
Single MySQL worker can be crashed (NULL deref) with certain SELECT statements
    </Bugzilla>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1420
https://nvd.nist.gov/vuln/detail/CVE-2007-1420
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1452">
    <Bugzilla id="240162" url="https://bugzilla.redhat.com/show_bug.cgi?id=240162" xml:lang="en:us">
fdf extension input filtering
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The FDF support (ext/fdf) in PHP 5.2.0 and earlier does not implement the input filtering hooks for ext/filter, which allows remote attackers to bypass web site filters via an application/vnd.fdf formatted POST.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The filter extension was not shipped in versions of PHP provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1452
https://nvd.nist.gov/vuln/detail/CVE-2007-1452
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1453">
    <Bugzilla id="240163" url="https://bugzilla.redhat.com/show_bug.cgi?id=240163" xml:lang="en:us">
filter extension buffer underflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The filter extension was not shipped in versions of PHP provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1453
https://nvd.nist.gov/vuln/detail/CVE-2007-1453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1454">
    <Bugzilla id="240165" url="https://bugzilla.redhat.com/show_bug.cgi?id=240165" xml:lang="en:us">
php filter extension FILTER_SANITIZE_STRING bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a '&lt;' character followed by certain whitespace characters, which passes one filter but is collapsed into a valid tag, as demonstrated using %0b.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The filter extension was not shipped in versions of PHP provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1454
https://nvd.nist.gov/vuln/detail/CVE-2007-1454
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1460">
    <Details source="Mitre" xml:lang="en:us">
The zip:// URL wrapper provided by the PECL zip extension in PHP before 4.4.7, and 5.2.0 and 5.2.1, does not implement safemode or open_basedir checks, which allows remote attackers to read ZIP archives located outside of the intended directories.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The zip extension was not shipped in versions of PHP  provided for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1460
https://nvd.nist.gov/vuln/detail/CVE-2007-1460
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1461">
    <Details source="Mitre" xml:lang="en:us">
The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1461
https://nvd.nist.gov/vuln/detail/CVE-2007-1461
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1462">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-13T00:00:00</PublicDate>
    <Bugzilla id="1618300" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618300" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The luci server component in conga preserves the password between page loads for the Add System/Cluster task flow by storing the password in the Value attribute of a password entry field, which allows attackers to steal the password by performing a &quot;view source&quot; or other operation to obtain the web page.  NOTE: there are limited circumstances under which such an attack is feasible.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_cluster:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2006-07-20T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0331">RHBA-2007:0331</Advisory>
        <Package name="conga">conga-0:0.9.2-6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1462
https://nvd.nist.gov/vuln/detail/CVE-2007-1462
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1466">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-16T00:00:00</PublicDate>
    <Bugzilla id="1618301" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618301" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the WP6GeneralTextPacket::_readContents function in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file, a different vulnerability than CVE-2007-0002.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Fridrich Štrba and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-38.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0033">RHSA-2007:0033</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-10.6.0.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0055">RHSA-2007:0055</Advisory>
        <Package name="libwpd">libwpd-0:0.8.7-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1466
https://nvd.nist.gov/vuln/detail/CVE-2007-1466
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1475">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the (1) ibase_connect and (2) ibase_pconnect functions in the interbase extension in PHP 4.4.6 and earlier allow context-dependent attackers to execute arbitrary code via a long argument.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include ibase support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1475
https://nvd.nist.gov/vuln/detail/CVE-2007-1475
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1484">
    <Details source="Mitre" xml:lang="en:us">
The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1484
https://nvd.nist.gov/vuln/detail/CVE-2007-1484
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1496">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-07T00:00:00</PublicDate>
    <Bugzilla id="238946" url="https://bugzilla.redhat.com/show_bug.cgi?id=238946" xml:lang="en:us">
Various NULL pointer dereferences in netfilter code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using &quot;multiple packets per netlink message&quot;, and (3) bridged packets, which trigger a NULL pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1496
https://nvd.nist.gov/vuln/detail/CVE-2007-1496
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1497">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-07T00:00:00</PublicDate>
    <Bugzilla id="238947" url="https://bugzilla.redhat.com/show_bug.cgi?id=238947" xml:lang="en:us">
IPv6 fragments bypass in nf_conntrack netfilter code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1497
https://nvd.nist.gov/vuln/detail/CVE-2007-1497
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1521">
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1521
https://nvd.nist.gov/vuln/detail/CVE-2007-1521
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1522">
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1522
https://nvd.nist.gov/vuln/detail/CVE-2007-1522
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1536">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-08T00:00:00</PublicDate>
    <Bugzilla id="233164" url="https://bugzilla.redhat.com/show_bug.cgi?id=233164" xml:lang="en:us">
file 4.20 fixes a heap overflow in that can result in arbitrary code execution
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the file_printf function in the &quot;file&quot; program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0124">RHSA-2007:0124</Advisory>
        <Package name="file">file-0:4.10-3.EL4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0124">RHSA-2007:0124</Advisory>
        <Package name="file">file-0:4.17-9.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1536
https://nvd.nist.gov/vuln/detail/CVE-2007-1536
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1558">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-02T00:00:00</PublicDate>
    <Bugzilla id="241191" url="https://bugzilla.redhat.com/show_bug.cgi?id=241191" xml:lang="en:us">
fetchmail/mutt/evolution/...: APOP password disclosure vulnerability
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0385">RHSA-2007:0385</Advisory>
        <Package name="fetchmail">fetchmail-0:5.9.0-21.7.3.el2.1.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0353">RHSA-2007:0353</Advisory>
        <Package name="evolution">evolution-0:1.4.5-20.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0385">RHSA-2007:0385</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.0-3.el3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0353">RHSA-2007:0353</Advisory>
        <Package name="evolution">evolution-0:2.0.2-35.0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0385">RHSA-2007:0385</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.5-6.0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-12.0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1140">RHSA-2009:1140</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.el4_8.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0344">RHSA-2007:0344</Advisory>
        <Package name="evolution-data-server">evolution-data-server-0:1.8.0-15.0.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0385">RHSA-2007:0385</Advisory>
        <Package name="fetchmail">fetchmail-0:6.3.6-1.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.2.2-3.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-07-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1140">RHSA-2009:1140</Advisory>
        <Package name="ruby">ruby-0:1.8.5-5.el5_3.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1558
https://nvd.nist.gov/vuln/detail/CVE-2007-1558
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1560">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618302" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618302" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0131">RHSA-2007:0131</Advisory>
        <Package name="squid">squid-7:2.6.STABLE6-4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1560
https://nvd.nist.gov/vuln/detail/CVE-2007-1560
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1562">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-22T00:00:00</PublicDate>
    <Bugzilla id="1618368" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618368" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1562
https://nvd.nist.gov/vuln/detail/CVE-2007-1562
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1564">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-22T00:00:00</PublicDate>
    <Bugzilla id="233592" url="https://bugzilla.redhat.com/show_bug.cgi?id=233592" xml:lang="en:us">
FTP protocol PASV design flaw affects konqueror
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.

More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1564
https://nvd.nist.gov/vuln/detail/CVE-2007-1564
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1565">
    <Details source="Mitre" xml:lang="en:us">
Konqueror 3.5.5 allows remote attackers to cause a denial of service (crash) by using JavaScript to read a child iframe having an ftp:// URI.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as Konqueror to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1565
https://nvd.nist.gov/vuln/detail/CVE-2007-1565
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1581">
    <Details source="Mitre" xml:lang="en:us">
The resource system in PHP 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting the hash_update_file function via a userspace (1) error or (2) stream handler, which can then be used to destroy and modify internal resources.  NOTE: it was later reported that PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 are also affected.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1581
https://nvd.nist.gov/vuln/detail/CVE-2007-1581
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1582">
    <Details source="Mitre" xml:lang="en:us">
The resource system in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to execute arbitrary code by interrupting certain functions in the GD (ext/gd) extension and unspecified other extensions via a userspace error handler, which can be used to destroy and modify internal resources.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1582
https://nvd.nist.gov/vuln/detail/CVE-2007-1582
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1583">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-20T00:00:00</PublicDate>
    <Bugzilla id="1618303" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618303" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0153">RHSA-2007:0153</Advisory>
        <Package name="php">php-0:5.1.6-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0162">RHSA-2007:0162</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1583
https://nvd.nist.gov/vuln/detail/CVE-2007-1583
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1584">
    <Details source="Mitre" xml:lang="en:us">
Buffer underflow in the header function in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by passing an all-whitespace string to this function, which causes it to write '\0' characters in whitespace that precedes the string.
    </Details>
    <Statement xml:lang="en:us">
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0907.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1584
https://nvd.nist.gov/vuln/detail/CVE-2007-1584
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1592">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-16T00:00:00</PublicDate>
    <Bugzilla id="243258" url="https://bugzilla.redhat.com/show_bug.cgi?id=243258" xml:lang="en:us">
IPv6 oops triggerable by any user
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0672">RHSA-2007:0672</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.72</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0673">RHSA-2007:0673</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.65</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0436">RHSA-2007:0436</Advisory>
        <Package name="kernel">kernel-0:2.4.21-50.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1592
https://nvd.nist.gov/vuln/detail/CVE-2007-1592
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1649">
    <Details source="Mitre" xml:lang="en:us">
PHP 5.2.1 allows context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with S:, which does not properly track the number of input bytes being processed.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1649
https://nvd.nist.gov/vuln/detail/CVE-2007-1649
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1659">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="315871" url="https://bugzilla.redhat.com/show_bug.cgi?id=315871" xml:lang="en:us">
pcre regular expression flaws
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched &quot;\Q\E&quot; sequences with orphan &quot;\E&quot; codes.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Tavis Ormandy and Will Drewry for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1068">RHSA-2007:1068</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_6.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0967">RHSA-2007:0967</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_0.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1659
https://nvd.nist.gov/vuln/detail/CVE-2007-1659
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1660">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="315881" url="https://bugzilla.redhat.com/show_bug.cgi?id=315881" xml:lang="en:us">
pcre regular expression flaws
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified &quot;multiple forms of character class&quot;, which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Tavis Ormandy and Will Drewry for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1065">RHSA-2007:1065</Advisory>
        <Package name="pcre">pcre-0:3.4-2.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0546">RHSA-2008:0546</Advisory>
        <Package name="php">php-0:4.1.2-2.20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1063">RHSA-2007:1063</Advisory>
        <Package name="pcre">pcre-0:3.9-10.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0968">RHSA-2007:0968</Advisory>
        <Package name="pcre">pcre-0:4.5-4.el4_5.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0967">RHSA-2007:0967</Advisory>
        <Package name="pcre">pcre-0:6.6-2.el5_0.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1660
https://nvd.nist.gov/vuln/detail/CVE-2007-1660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1661">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="392931" url="https://bugzilla.redhat.com/show_bug.cgi?id=392931" xml:lang="en:us">
: pcre &lt; 7.3 non-UTF-8 over-backtracking issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.3 backtracks too far when matching certain input bytes against some regex patterns in non-UTF-8 mode, which allows context-dependent attackers to obtain sensitive information or cause a denial of service (crash), as demonstrated by the &quot;\X?\d&quot; and &quot;\P{L}?\d&quot; patterns.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1661
https://nvd.nist.gov/vuln/detail/CVE-2007-1661
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1662">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="392921" url="https://bugzilla.redhat.com/show_bug.cgi?id=392921" xml:lang="en:us">
: pcre &lt; 7.3 unmatched bracket/paren past EoS read issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.3 reads past the end of the string when searching for unmatched brackets and parentheses, which allows context-dependent attackers to cause a denial of service (crash), possibly involving forward references.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1662
https://nvd.nist.gov/vuln/detail/CVE-2007-1662
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1667">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-09T00:00:00</PublicDate>
    <Bugzilla id="231684" url="https://bugzilla.redhat.com/show_bug.cgi?id=231684" xml:lang="en:us">
XGetPixel() integer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-82.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0125">RHSA-2007:0125</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-120.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0126">RHSA-2007:0126</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.13.37.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0157">RHSA-2007:0157</Advisory>
        <Package name="libX11">libX11-0:1.0.3-8.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0157">RHSA-2007:0157</Advisory>
        <Package name="xorg-x11-apps">xorg-x11-apps-0:7.1-4.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1667
https://nvd.nist.gov/vuln/detail/CVE-2007-1667
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1700">
    <Bugzilla id="240167" url="https://bugzilla.redhat.com/show_bug.cgi?id=240167" xml:lang="en:us">
php session extension refcount handling issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0910.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1700
https://nvd.nist.gov/vuln/detail/CVE-2007-1700
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1701">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="240431" url="https://bugzilla.redhat.com/show_bug.cgi?id=240431" xml:lang="en:us">
php session extension global variable clobber
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with &quot;_SESSION|s:39:&quot;.
    </Details>
    <Statement xml:lang="en:us">
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0910.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1701
https://nvd.nist.gov/vuln/detail/CVE-2007-1701
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1709">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the confirm_phpdoc_compiled function in the phpDOC extension (PECL phpDOC) in PHP 5.2.1 allows context-dependent attackers to execute arbitrary code via a long argument string.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Red Hat Application Stack, and Stronghold 4.0 do not include PHPDoc support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1709
https://nvd.nist.gov/vuln/detail/CVE-2007-1709
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1710">
    <Details source="Mitre" xml:lang="en:us">
The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a &quot;php://../../&quot; sequence.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1710
https://nvd.nist.gov/vuln/detail/CVE-2007-1710
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1711">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-25T00:00:00</PublicDate>
    <Bugzilla id="1618304" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618304" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Double free vulnerability in the unserializer in PHP 4.4.5 and 4.4.6 allows context-dependent attackers to execute arbitrary code by overwriting variables pointing to (1) the GLOBALS array or (2) the session data in _SESSION.  NOTE: this issue was introduced when attempting to patch CVE-2007-1701 (MOPB-31-2007).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0154">RHSA-2007:0154</Advisory>
        <Package name="php">php-0:4.1.2-2.17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0163">RHSA-2007:0163</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-15</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1711
https://nvd.nist.gov/vuln/detail/CVE-2007-1711
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1716">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-03T00:00:00</PublicDate>
    <Bugzilla id="1618305" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618305" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pam_console does not properly restore ownership for certain console devices when there are multiple users logged into the console and one user logs out, which might allow local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233581

The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here:
http://www.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0465">RHSA-2007:0465</Advisory>
        <Package name="cdrtools">cdrtools-8:2.01.0.a32-0.EL3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0465">RHSA-2007:0465</Advisory>
        <Package name="pam">pam-0:0.75-72</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0737">RHSA-2007:0737</Advisory>
        <Package name="pam">pam-0:0.77-66.23</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0555">RHSA-2007:0555</Advisory>
        <Package name="pam">pam-0:0.99.6.2-3.26.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1716
https://nvd.nist.gov/vuln/detail/CVE-2007-1716
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1717">
    <Details source="Mitre" xml:lang="en:us">
The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages.  NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.
    </Details>
    <Statement xml:lang="en:us">
This issue has no security impact.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1717
https://nvd.nist.gov/vuln/detail/CVE-2007-1717
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1718">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-26T00:00:00</PublicDate>
    <Bugzilla id="1618306" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618306" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a &quot;\r\n\t\n&quot; sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.2-40.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0155">RHSA-2007:0155</Advisory>
        <Package name="php">php-0:4.3.9-3.22.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-04-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0153">RHSA-2007:0153</Advisory>
        <Package name="php">php-0:5.1.6-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-04-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0162">RHSA-2007:0162</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.6</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1718
https://nvd.nist.gov/vuln/detail/CVE-2007-1718
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1730">
    <Bugzilla id="346441" url="https://bugzilla.redhat.com/show_bug.cgi?id=346441" xml:lang="en:us">
kernel dccp memory disclosure
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in the DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later allows local users to read kernel memory or cause a denial of service (oops) via a negative optlen value.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1730
https://nvd.nist.gov/vuln/detail/CVE-2007-1730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1734">
    <Details source="Mitre" xml:lang="en:us">
The DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later does not verify the upper bounds of the optlen value, which allows local users running on certain architectures to read kernel memory or cause a denial of service (oops), a related issue to CVE-2007-1730.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1734
https://nvd.nist.gov/vuln/detail/CVE-2007-1734
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1741">
    <Details source="Mitre" xml:lang="en:us">
Multiple race conditions in suexec in Apache HTTP Server (httpd) 2.2.3 between directory and file validation, and their usage, allow local users to gain privileges and execute arbitrary code by renaming directories or performing symlink attacks. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because &quot;the attacks described rely on an insecure server configuration&quot; in which the user &quot;has write access to the document root.&quot;
    </Details>
    <Statement xml:lang="en:us">
These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1741
https://nvd.nist.gov/vuln/detail/CVE-2007-1741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1742">
    <Details source="Mitre" xml:lang="en:us">
suexec in Apache HTTP Server (httpd) 2.2.3 uses a partial comparison for verifying whether the current directory is within the document root, which might allow local users to perform unauthorized operations on incorrect directories, as demonstrated using &quot;html_backup&quot; and &quot;htmleditor&quot; under an &quot;html&quot; directory.  NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because &quot;the attacks described rely on an insecure server configuration&quot; in which the user &quot;has write access to the document root.&quot;
    </Details>
    <Statement xml:lang="en:us">
These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1742
https://nvd.nist.gov/vuln/detail/CVE-2007-1742
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1743">
    <Details source="Mitre" xml:lang="en:us">
suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted.  NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because &quot;the attacks described rely on an insecure server configuration&quot; in which the user &quot;has write access to the document root.&quot;  In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
    </Details>
    <Statement xml:lang="en:us">
These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1743
https://nvd.nist.gov/vuln/detail/CVE-2007-1743
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1777">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the zip_read_entry function in PHP 4 before 4.4.5 allows remote attackers to execute arbitrary code via a ZIP archive that contains an entry with a length value of 0xffffffff, which is incremented before use in an emalloc call, triggering a heap overflow.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The zip extension was not distributed with PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1777
https://nvd.nist.gov/vuln/detail/CVE-2007-1777
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1797">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-31T00:00:00</PublicDate>
    <Bugzilla id="235071" url="https://bugzilla.redhat.com/show_bug.cgi?id=235071" xml:lang="en:us">
Heap overflow in ImageMagick's DCM and XWD coders
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in ImageMagick before 6.3.3-5 allow remote attackers to execute arbitrary code via (1) a crafted DCM image, which results in a heap-based overflow in the ReadDCMImage function, or (2) the (a) colors or (b) comments field in a crafted XWD image, which results in a heap-based overflow in the ReadXWDImage function, different issues than CVE-2007-1667.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0165">RHSA-2008:0165</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.2.8.0-4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1797
https://nvd.nist.gov/vuln/detail/CVE-2007-1797
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1824">
    <Bugzilla id="240427" url="https://bugzilla.redhat.com/show_bug.cgi?id=240427" xml:lang="en:us">
php php_stream_filter_create overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the php_stream_filter_create function in PHP 5 before 5.2.1 allows remote attackers to cause a denial of service (application crash) via a php://filter/ URL that has a name ending in the '.' character.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0906.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1824
https://nvd.nist.gov/vuln/detail/CVE-2007-1824
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1825">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-02-14T00:00:00</PublicDate>
    <Bugzilla id="240426" url="https://bugzilla.redhat.com/show_bug.cgi?id=240426" xml:lang="en:us">
php imap_mail_compose() buffer overflow via type.parameters
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the imap_mail_compose function in PHP 5 before 5.2.1, and PHP 4 before 4.4.5, allows remote attackers to execute arbitrary code via a long boundary string in a type.parameters field. NOTE: as of 20070411, it appears that this issue might be subsumed by CVE-2007-0906.3.
    </Details>
    <Statement xml:lang="en:us">
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0906.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0081">RHSA-2007:0081</Advisory>
        <Package name="php">php-0:4.1.2-2.14</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.2-39.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-02-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0076">RHSA-2007:0076</Advisory>
        <Package name="php">php-0:4.3.9-3.22.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-03-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0082">RHSA-2007:0082</Advisory>
        <Package name="php">php-0:5.1.6-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-02-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0088">RHSA-2007:0088</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_stronghold:4.0">
        <ProductName>Stronghold 4.0 for RHEL 2.1AS</ProductName>
        <ReleaseDate>2007-02-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0089">RHSA-2007:0089</Advisory>
        <Package name="stronghold-php">stronghold-php-0:4.1.2-12</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1825
https://nvd.nist.gov/vuln/detail/CVE-2007-1825
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1835">
    <Details source="Mitre" xml:lang="en:us">
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1835
https://nvd.nist.gov/vuln/detail/CVE-2007-1835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1841">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-06T00:00:00</PublicDate>
    <Bugzilla id="238052" url="https://bugzilla.redhat.com/show_bug.cgi?id=238052" xml:lang="en:us">
ipsec-tools racoon DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0342">RHSA-2007:0342</Advisory>
        <Package name="ipsec-tools">ipsec-tools-0:0.6.5-8.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1841
https://nvd.nist.gov/vuln/detail/CVE-2007-1841
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1856">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-10T00:00:00</PublicDate>
    <Bugzilla id="235882" url="https://bugzilla.redhat.com/show_bug.cgi?id=235882" xml:lang="en:us">
crontab denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Vixie Cron before 4.1-r10 on Gentoo Linux is installed with insecure permissions, which allows local users to cause a denial of service (cron failure) by creating hard links, which results in a failed st_nlink check in database.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0345">RHSA-2007:0345</Advisory>
        <Package name="vixie-cron">vixie-cron-0:4.1-19.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0345">RHSA-2007:0345</Advisory>
        <Package name="vixie-cron">vixie-cron-4:4.1-47.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0345">RHSA-2007:0345</Advisory>
        <Package name="vixie-cron">vixie-cron-4:4.1-70.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1856
https://nvd.nist.gov/vuln/detail/CVE-2007-1856
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1858">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-19T00:00:00</PublicDate>
    <Bugzilla id="237083" url="https://bugzilla.redhat.com/show_bug.cgi?id=237083" xml:lang="en:us">
tomcat anonymous cipher issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:1">
        <ProductName>RHAPS Version 1 for RHEL 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0340">RHSA-2007:0340</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_5rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0326">RHSA-2007:0326</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1858
https://nvd.nist.gov/vuln/detail/CVE-2007-1858
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1859">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-03T00:00:00</PublicDate>
    <Bugzilla id="237003" url="https://bugzilla.redhat.com/show_bug.cgi?id=237003" xml:lang="en:us">
xscreensaver authentication bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0322">RHSA-2007:0322</Advisory>
        <Package name="xscreensaver">xscreensaver-1:3.33-4.rhel21.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0322">RHSA-2007:0322</Advisory>
        <Package name="xscreensaver">xscreensaver-1:4.10-21.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0322">RHSA-2007:0322</Advisory>
        <Package name="xscreensaver">xscreensaver-1:4.18-5.rhel4.14</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1859
https://nvd.nist.gov/vuln/detail/CVE-2007-1859
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1860">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-21T00:00:00</PublicDate>
    <Bugzilla id="237656" url="https://bugzilla.redhat.com/show_bug.cgi?id=237656" xml:lang="en:us">
mod_jk sends decoded URL to tomcat
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0379">RHSA-2007:0379</Advisory>
        <Package name="mod_jk">mod_jk-0:1.2.20-1.el4s1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0380">RHSA-2007:0380</Advisory>
        <Package name="mod_jk">mod_jk-0:1.2.20-1jpp_2rh</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1860
https://nvd.nist.gov/vuln/detail/CVE-2007-1860
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1861">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-25T00:00:00</PublicDate>
    <Bugzilla id="238960" url="https://bugzilla.redhat.com/show_bug.cgi?id=238960" xml:lang="en:us">
infinite recursion in netlink
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1861
https://nvd.nist.gov/vuln/detail/CVE-2007-1861
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1862">
    <Bugzilla id="242606" url="https://bugzilla.redhat.com/show_bug.cgi?id=242606" xml:lang="en:us">
httpd's mod_mem_cache sensitive information disclosure
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The recall_headers function in mod_mem_cache in Apache 2.2.4 does not properly copy all levels of header data, which can cause Apache to return HTTP headers containing previously used data, which could be used by remote attackers to obtain potentially sensitive information.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue was specific to httpd version 2.2.4 and did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1862
https://nvd.nist.gov/vuln/detail/CVE-2007-1862
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1863">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-02T00:00:00</PublicDate>
    <Bugzilla id="244658" url="https://bugzilla.redhat.com/show_bug.cgi?id=244658" xml:lang="en:us">
httpd mod_cache segfault
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0533">RHSA-2007:0533</Advisory>
        <Package name="httpd">httpd-0:2.0.46-67.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0534">RHSA-2007:0534</Advisory>
        <Package name="httpd">httpd-0:2.0.52-32.2.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0556">RHSA-2007:0556</Advisory>
        <Package name="httpd">httpd-0:2.2.3-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0557">RHSA-2007:0557</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1863
https://nvd.nist.gov/vuln/detail/CVE-2007-1863
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1864">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-03T00:00:00</PublicDate>
    <Bugzilla id="239009" url="https://bugzilla.redhat.com/show_bug.cgi?id=239009" xml:lang="en:us">
php libxmlrpc library overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0349">RHSA-2007:0349</Advisory>
        <Package name="php">php-0:4.3.9-3.22.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0348">RHSA-2007:0348</Advisory>
        <Package name="php">php-0:5.1.6-12.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0355">RHSA-2007:0355</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1864
https://nvd.nist.gov/vuln/detail/CVE-2007-1864
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1883">
    <Details source="Mitre" xml:lang="en:us">
PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows context-dependent attackers to read arbitrary memory locations via an interruption that triggers a user space error handler that changes a parameter to an arbitrary pointer, as demonstrated via the iptcembed function, which calls certain convert_to_* functions with its input parameters.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1883
https://nvd.nist.gov/vuln/detail/CVE-2007-1883
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1884">
    <Details source="Mitre" xml:lang="en:us">
Multiple integer signedness errors in the printf function family in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 on 64 bit machines allow context-dependent attackers to execute arbitrary code via (1) certain negative argument numbers that arise in the php_formatted_print function because of 64 to 32 bit truncation, and bypass a check for the maximum allowable value; and (2) a width and precision of -1, which make it possible for the php_sprintf_appendstring function to place an internal buffer at an arbitrary memory location.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1884
https://nvd.nist.gov/vuln/detail/CVE-2007-1884
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1885">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the str_replace function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via a single character search string in conjunction with a long replacement string, which overflows a 32 bit length counter.  NOTE: this is probably the same issue as CVE-2007-0906.6.
    </Details>
    <Statement xml:lang="en:us">
This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0906.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1885
https://nvd.nist.gov/vuln/detail/CVE-2007-1885
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1886">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the str_replace function in PHP 4.4.5 and PHP 5.2.1 allows context-dependent attackers to have an unknown impact via a single character search string in conjunction with a single character replacement string, which causes an &quot;off by one overflow.&quot;
    </Details>
    <Statement xml:lang="en:us">
We do not consider this flaw to be a security issue as it is only exploitable by the script author. No trust boundary is crossed.

For more information please see:
https://bugzilla.redhat.com/show_bug.cgi?id=mopb#c37
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1886
https://nvd.nist.gov/vuln/detail/CVE-2007-1886
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1887">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the sqlite_decode_binary function in the bundled sqlite library in PHP 4 before 4.4.5 and PHP 5 before 5.2.1 allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter, as demonstrated by calling the sqlite_udf_decode_binary function with a 0x01 character.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1887
https://nvd.nist.gov/vuln/detail/CVE-2007-1887
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1888">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the sqlite_decode_binary function in src/encode.c in SQLite 2, as used by PHP 4.x through 5.x and other applications, allows context-dependent attackers to execute arbitrary code via an empty value of the in parameter.  NOTE: some PHP installations use a bundled version of sqlite without this vulnerability.  The SQLite developer has argued that this issue could be due to a misuse of the sqlite_decode_binary() API.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1888
https://nvd.nist.gov/vuln/detail/CVE-2007-1888
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1889">
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in the _zend_mm_alloc_int function in the Zend Memory Manager in PHP 5.2.0 allows remote attackers to execute arbitrary code via a large emalloc request, related to an incorrect signed long cast, as demonstrated via the HTTP SOAP client in PHP, and via a call to msg_receive with the largest positive integer value of maxsize.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1889
https://nvd.nist.gov/vuln/detail/CVE-2007-1889
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1890">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the msg_receive function in PHP 4 before 4.4.5 and PHP 5 before 5.2.1, on FreeBSD and possibly other platforms, allows context-dependent attackers to execute arbitrary code via certain maxsize values, as demonstrated by 0xffffffff.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run; any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself.  We therefore do not classify this issue as security-sensitive since no trust boundary is crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1890
https://nvd.nist.gov/vuln/detail/CVE-2007-1890
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1900">
    <Bugzilla id="242034" url="https://bugzilla.redhat.com/show_bug.cgi?id=242034" xml:lang="en:us">
php ext/filter email validation issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The filter extension was not shipped in the versions of PHP supplied for Red Hat Enterprise Linux 2.1, 3, 4, 5, Stronghold 4.0, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1900
https://nvd.nist.gov/vuln/detail/CVE-2007-1900
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-1995">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-08T00:00:00</PublicDate>
    <Bugzilla id="240478" url="https://bugzilla.redhat.com/show_bug.cgi?id=240478" xml:lang="en:us">
Quagga bgpd DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0389">RHSA-2007:0389</Advisory>
        <Package name="quagga">quagga-0:0.96.2-12.3E</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0389">RHSA-2007:0389</Advisory>
        <Package name="quagga">quagga-0:0.98.3-2.4.0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0389">RHSA-2007:0389</Advisory>
        <Package name="quagga">quagga-0:0.98.6-2.1.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-1995
https://nvd.nist.gov/vuln/detail/CVE-2007-1995
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2022">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-25T00:00:00</PublicDate>
    <Bugzilla id="243617" url="https://bugzilla.redhat.com/show_bug.cgi?id=243617" xml:lang="en:us">
kdebase3 flash-player interaction problem
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0494">RHSA-2007:0494</Advisory>
        <Package name="kdebase">kdebase-6:3.1.3-5.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0494">RHSA-2007:0494</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-5.19.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0494">RHSA-2007:0494</Advisory>
        <Package name="kdebase">kdebase-6:3.5.4-13.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2022
https://nvd.nist.gov/vuln/detail/CVE-2007-2022
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2026">
    <Details source="Mitre" xml:lang="en:us">
The gnu regular expression code in file 4.20 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted document with a large number of line feed characters, which is not well handled by OS/2 REXX regular expressions that use wildcards, as originally reported for AMaViS.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of file as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2026
https://nvd.nist.gov/vuln/detail/CVE-2007-2026
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2027">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-04-04T00:00:00</PublicDate>
    <Bugzilla id="235411" url="https://bugzilla.redhat.com/show_bug.cgi?id=235411" xml:lang="en:us">
elinks tries to load .po files from a non-absolute path
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.4</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a &quot;../po&quot; directory, which can be leveraged to conduct format string attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-10-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1471">RHSA-2009:1471</Advisory>
        <Package name="elinks">elinks-0:0.9.2-4.el4_8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-10-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1471">RHSA-2009:1471</Advisory>
        <Package name="elinks">elinks-0:0.11.1-6.el5_4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2027
https://nvd.nist.gov/vuln/detail/CVE-2007-2027
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2028">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-12T00:00:00</PublicDate>
    <Bugzilla id="1618307" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618307" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0338">RHSA-2007:0338</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-2.RHEL3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0338">RHSA-2007:0338</Advisory>
        <Package name="freeradius">freeradius-0:1.0.1-3.RHEL4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0338">RHSA-2007:0338</Advisory>
        <Package name="freeradius">freeradius-0:1.1.3-1.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2028
https://nvd.nist.gov/vuln/detail/CVE-2007-2028
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2030">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-01-13T00:00:00</PublicDate>
    <Bugzilla id="236585" url="https://bugzilla.redhat.com/show_bug.cgi?id=236585" xml:lang="en:us">
/tmp race in lha
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
    </Details>
    <Statement xml:lang="en:us">
Red Hat no longer plans to fix this issue in Red Hat Enterprise Linux 4.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>lha</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2030
https://nvd.nist.gov/vuln/detail/CVE-2007-2030
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2052">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-04-02T00:00:00</PublicDate>
    <Bugzilla id="235093" url="https://bugzilla.redhat.com/show_bug.cgi?id=235093" xml:lang="en:us">
python off-by-one locale.strxfrm() (possible memory disclosure)
    </Bugzilla>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1077">RHSA-2007:1077</Advisory>
        <Package name="python">python-0:1.5.2-43.72.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.2.3-6.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.3.4-14.4.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1176">RHSA-2009:1176</Advisory>
        <Package name="python">python-0:2.4.3-24.el5_3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2052
https://nvd.nist.gov/vuln/detail/CVE-2007-2052
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2138">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-23T00:00:00</PublicDate>
    <Bugzilla id="237682" url="https://bugzilla.redhat.com/show_bug.cgi?id=237682" xml:lang="en:us">
PostgreSQL security-definer function privilege escalation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Untrusted search path vulnerability in PostgreSQL before 7.3.19, 7.4.x before 7.4.17, 8.0.x before 8.0.13, 8.1.x before 8.1.9, and 8.2.x before 8.2.4 allows remote authenticated users, when permitted to call a SECURITY DEFINER function, to gain the privileges of the function owner, related to &quot;search_path settings.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0336">RHSA-2007:0336</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.19-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0336">RHSA-2007:0336</Advisory>
        <Package name="postgresql">postgresql-0:7.4.17-1.RHEL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0336">RHSA-2007:0336</Advisory>
        <Package name="postgresql">postgresql-0:8.1.9-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0337">RHSA-2007:0337</Advisory>
        <Package name="postgresql">postgresql-0:8.1.9-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2138
https://nvd.nist.gov/vuln/detail/CVE-2007-2138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2172">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-03-26T00:00:00</PublicDate>
    <Bugzilla id="250429" url="https://bugzilla.redhat.com/show_bug.cgi?id=250429" xml:lang="en:us">
fib_semantics.c out of bounds access vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an &quot;out of bound access&quot; by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0787">RHSA-2008:0787</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.67</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0001">RHSA-2009:0001</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.74</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1049">RHSA-2007:1049</Advisory>
        <Package name="kernel">kernel-0:2.4.21-53.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2172
https://nvd.nist.gov/vuln/detail/CVE-2007-2172
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2176">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Mozilla Firefox allows remote attackers to execute arbitrary code via unspecified vectors involving Javascript errors.  NOTE: this might be the same issue as CVE-2007-2175.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue is a flaw in the way Java and Quicktime interact.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2176
https://nvd.nist.gov/vuln/detail/CVE-2007-2176
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2231">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-28T00:00:00</PublicDate>
    <Bugzilla id="238439" url="https://bugzilla.redhat.com/show_bug.cgi?id=238439" xml:lang="en:us">
Directory traversal in dovecot with zlib plugin
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect Red Hat Enterprise Linux prior to version 5.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0297">RHSA-2008:0297</Advisory>
        <Package name="dovecot">dovecot-0:1.0.7-2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2231
https://nvd.nist.gov/vuln/detail/CVE-2007-2231
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2241">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-30T00:00:00</PublicDate>
    <Bugzilla id="238398" url="https://bugzilla.redhat.com/show_bug.cgi?id=238398" xml:lang="en:us">
bind remote DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of BIND as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2241
https://nvd.nist.gov/vuln/detail/CVE-2007-2241
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2242">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-04-17T00:00:00</PublicDate>
    <Bugzilla id="238949" url="https://bugzilla.redhat.com/show_bug.cgi?id=238949" xml:lang="en:us">
IPv6 routing headers issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0347">RHSA-2007:0347</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2242
https://nvd.nist.gov/vuln/detail/CVE-2007-2242
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2243">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which displays a different response if the user account exists, a similar issue to CVE-2001-1483.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. The OpenSSH packages as shipped with Red Hat Enterprise Linux do not contain S/KEY support.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2243
https://nvd.nist.gov/vuln/detail/CVE-2007-2243
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2263">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-10-25T00:00:00</PublicDate>
    <Bugzilla id="353671" url="https://bugzilla.redhat.com/show_bug.cgi?id=353671" xml:lang="en:us">
realplayer swf file (flash media) heap overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="realplayer">realplayer-0:10.0.9-0.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="RealPlayer">RealPlayer-0:10.0.9-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2263
https://nvd.nist.gov/vuln/detail/CVE-2007-2263
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2264">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-10-25T00:00:00</PublicDate>
    <Bugzilla id="353691" url="https://bugzilla.redhat.com/show_bug.cgi?id=353691" xml:lang="en:us">
realplayer ram file heap overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="realplayer">realplayer-0:10.0.9-0.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="RealPlayer">RealPlayer-0:10.0.9-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2264
https://nvd.nist.gov/vuln/detail/CVE-2007-2264
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2292">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-25T00:00:00</PublicDate>
    <Bugzilla id="1618308" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618308" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.6.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-6.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-5.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2292
https://nvd.nist.gov/vuln/detail/CVE-2007-2292
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2348">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-01-09T00:00:00</PublicDate>
    <Bugzilla id="236238" url="https://bugzilla.redhat.com/show_bug.cgi?id=236238" xml:lang="en:us">
lftp mirror --script does not escape names and targets of symbolic links
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.1</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
mirror --script in lftp before 3.5.9 does not properly quote shell metacharacters, which might allow remote user-assisted attackers to execute shell commands via a malicious script.  NOTE: it is not clear whether this issue crosses security boundaries, since the script already supports commands such as &quot;get&quot; which could overwrite executable files.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect lftp as supplied with Red Hat Enterprise Linux 3.

This issue was addressed for Red Hat Enterprise Linux 5 by
https://rhn.redhat.com/errata/RHSA-2009-1278.html

The Red Hat Security Response Team has rated this issue as having low security impact, this issue will not fixed in Red Hat Enterprise Linux 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-09-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1278">RHSA-2009:1278</Advisory>
        <Package name="lftp">lftp-0:3.7.11-4.el5</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>lftp</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2348
https://nvd.nist.gov/vuln/detail/CVE-2007-2348
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2353">
    <Details source="Mitre" xml:lang="en:us">
Apache Axis 1.0 allows remote attackers to obtain sensitive information by requesting a non-existent WSDL file, which reveals the installation path in the resulting exception message.
    </Details>
    <Statement xml:lang="en:us">
Red Hat ship Axis in a number of products; however the installation path of Axis is fixed and deterministic, so this flaw does not disclose otherwise unknown information.  We do not plan on issuing updates to fix this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2353
https://nvd.nist.gov/vuln/detail/CVE-2007-2353
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2356">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-27T00:00:00</PublicDate>
    <Bugzilla id="238420" url="https://bugzilla.redhat.com/show_bug.cgi?id=238420" xml:lang="en:us">
Stack overflow in gimp's sunras plugin
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the set_color_table function in sunras.c in the SUNRAS plugin in Gimp 2.2.14 allows user-assisted remote attackers to execute arbitrary code via a crafted RAS file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0343">RHSA-2007:0343</Advisory>
        <Package name="gimp">gimp-1:1.2.1-7.1.el2_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0343">RHSA-2007:0343</Advisory>
        <Package name="gimp">gimp-1:1.2.3-20.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0343">RHSA-2007:0343</Advisory>
        <Package name="gimp">gimp-1:2.0.5-6.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0343">RHSA-2007:0343</Advisory>
        <Package name="gimp">gimp-2:2.2.13-2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2356
https://nvd.nist.gov/vuln/detail/CVE-2007-2356
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2383">
    <Bugzilla id="539592" url="https://bugzilla.redhat.com/show_bug.cgi?id=539592" xml:lang="en:us">
embedded prototype.js JavaScript hijacking
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka &quot;JavaScript Hijacking.&quot;
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2383
https://nvd.nist.gov/vuln/detail/CVE-2007-2383
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2407">
    <Details source="Mitre" xml:lang="en:us">
The Samba server on Apple Mac OS X 10.3.9 and 10.4.10, when Windows file sharing is enabled, does not enforce disk quotas after dropping privileges, which allows remote authenticated users to use disk space in excess of quota.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw is specific to Mac OS X and does not affect any version of Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2407
https://nvd.nist.gov/vuln/detail/CVE-2007-2407
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2435">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-04-30T00:00:00</PublicDate>
    <Bugzilla id="239660" url="https://bugzilla.redhat.com/show_bug.cgi?id=239660" xml:lang="en:us">
javaws vulnerabilities
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Sun Java Web Start in JDK and JRE 5.0 Update 10 and earlier, and Java Web Start in SDK and JRE 1.4.2_13 and earlier, allows remote attackers to perform unauthorized actions via an application that grants privileges to itself, related to &quot;Incorrect Use of System Classes&quot; and probably related to support for JNLP files.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2435
https://nvd.nist.gov/vuln/detail/CVE-2007-2435
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2437">
    <Details source="Mitre" xml:lang="en:us">
The X render (Xrender) extension in X.org X Window System 7.0, 7.1, and 7.2, with Xserver 1.3.0 and earlier, allows remote authenticated users to cause a denial of service (daemon crash) via crafted values to the (1) XRenderCompositeTrapezoids and (2) XRenderAddTraps functions, which trigger a divide-by-zero error.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user assisted client crash such as this to be a security flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2437
https://nvd.nist.gov/vuln/detail/CVE-2007-2437
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2438">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-26T00:00:00</PublicDate>
    <Bugzilla id="238734" url="https://bugzilla.redhat.com/show_bug.cgi?id=238734" xml:lang="en:us">
vim-7 modeline security issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0346">RHSA-2007:0346</Advisory>
        <Package name="vim">vim-2:7.0.109-3.el5.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2438
https://nvd.nist.gov/vuln/detail/CVE-2007-2438
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2442">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-26T00:00:00</PublicDate>
    <Bugzilla id="245547" url="https://bugzilla.redhat.com/show_bug.cgi?id=245547" xml:lang="en:us">
krb5 RPC library unitialized pointer free
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The gssrpc__svcauth_gssapi function in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a zero-length RPC credential, which causes kadmind to free an uninitialized pointer during cleanup.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.2-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.7-66</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.3.4-49</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.5-26</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2442
https://nvd.nist.gov/vuln/detail/CVE-2007-2442
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2443">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-26T00:00:00</PublicDate>
    <Bugzilla id="245548" url="https://bugzilla.redhat.com/show_bug.cgi?id=245548" xml:lang="en:us">
krb5 RPC library stack overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (krb5) 1.6.1 and earlier might allow remote attackers to execute arbitrary code via a negative length value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.2-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.7-66</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.3.4-49</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.5-26</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2443
https://nvd.nist.gov/vuln/detail/CVE-2007-2443
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2444">
    <Details source="Mitre" xml:lang="en:us">
Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2444
https://nvd.nist.gov/vuln/detail/CVE-2007-2444
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2445">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-15T00:00:00</PublicDate>
    <Bugzilla id="239425" url="https://bugzilla.redhat.com/show_bug.cgi?id=239425" xml:lang="en:us">
libpng png_handle_tRNS flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Glenn Randers-Pehrson, Mats Palmgren, and Tavis Ormandy for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.0.14-10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.2-27</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng10">libpng10-0:1.0.13-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.7-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng10">libpng10-0:1.0.16-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0356">RHSA-2007:0356</Advisory>
        <Package name="libpng">libpng-2:1.2.10-7.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2445
https://nvd.nist.gov/vuln/detail/CVE-2007-2445
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2446">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-05-14T00:00:00</PublicDate>
    <Bugzilla id="239429" url="https://bugzilla.redhat.com/show_bug.cgi?id=239429" xml:lang="en:us">
samba heap overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Samba, TippingPoint, and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:2.2.12-1.21as.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.13.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.10-1.4E.12.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.23c-2.el5.2.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2446
https://nvd.nist.gov/vuln/detail/CVE-2007-2446
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2447">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-14T00:00:00</PublicDate>
    <Bugzilla id="239774" url="https://bugzilla.redhat.com/show_bug.cgi?id=239774" xml:lang="en:us">
samba code injection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the &quot;username map script&quot; smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Samba, TippingPoint, and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:2.2.12-1.21as.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.13.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.10-1.4E.12.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0354">RHSA-2007:0354</Advisory>
        <Package name="samba">samba-0:3.0.23c-2.el5.2.0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2447
https://nvd.nist.gov/vuln/detail/CVE-2007-2447
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2448">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-11-06T00:00:00</PublicDate>
    <Bugzilla id="243757" url="https://bugzilla.redhat.com/show_bug.cgi?id=243757" xml:lang="en:us">
subversion: revision properties disclosure to user with partial access
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>1.5</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:S/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Subversion 1.4.3 and earlier does not properly implement the &quot;partial access&quot; privilege for users who have access to changed paths but not copied paths, which allows remote authenticated users to obtain sensitive information (revision properties) via svn (1) propget, (2) proplist, or (3) propedit.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2011-01-13T00:00:00</ReleaseDate>
        <Advisory type="RHEA" url="https://access.redhat.com/errata/RHEA-2011:0039">RHEA-2011:0039</Advisory>
        <Package name="subversion">subversion-0:1.6.11-7.el5</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>subversion</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2448
https://nvd.nist.gov/vuln/detail/CVE-2007-2448
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2449">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-13T00:00:00</PublicDate>
    <Bugzilla id="244804" url="https://bugzilla.redhat.com/show_bug.cgi?id=244804" xml:lang="en:us">
tomcat examples jsp XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a &quot;snp/snoop.jsp;&quot; sequence.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0569">RHSA-2007:0569</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.4.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="mod_perl">mod_perl-0:2.0.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="rhn-web">rhn-web-0:5.1.1-7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0630">RHSA-2008:0630</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2449
https://nvd.nist.gov/vuln/detail/CVE-2007-2449
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2450">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-13T00:00:00</PublicDate>
    <Bugzilla id="244808" url="https://bugzilla.redhat.com/show_bug.cgi?id=244808" xml:lang="en:us">
tomcat host manager XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0569">RHSA-2007:0569</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.1.0.4.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2450
https://nvd.nist.gov/vuln/detail/CVE-2007-2450
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2452">
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the visit_old_format function in locate/locate.c in locate in GNU findutils before 4.2.31 might allow context-dependent attackers to execute arbitrary code via a long pathname in a locate database that has the old format, a different vulnerability than CVE-2001-1036.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Red Hat did not ship GNU locate in Red Hat Enterprise Linux 2.1, 3, 4, or 5.  This issue does not affect the mlocate or slocate packages that are supplied with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2452
https://nvd.nist.gov/vuln/detail/CVE-2007-2452
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2453">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-30T00:00:00</PublicDate>
    <Bugzilla id="241718" url="https://bugzilla.redhat.com/show_bug.cgi?id=241718" xml:lang="en:us">
/dev/random broken
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same values after reboots on systems without an entropy source.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the the Linux kernel supplied with Red Hat Enterprise Linux 2.1, 3, or 4.

For systems based on Red Hat Enterprise Linux 5, this is only an issue for systems without a real time clock, harddrive activity, or user input during boot time. Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=241718

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0376">RHSA-2007:0376</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2453
https://nvd.nist.gov/vuln/detail/CVE-2007-2453
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2509">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-03T00:00:00</PublicDate>
    <Bugzilla id="239014" url="https://bugzilla.redhat.com/show_bug.cgi?id=239014" xml:lang="en:us">
php CRLF injection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0888">RHSA-2007:0888</Advisory>
        <Package name="php">php-0:4.1.2-2.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0349">RHSA-2007:0349</Advisory>
        <Package name="php">php-0:4.3.9-3.22.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0348">RHSA-2007:0348</Advisory>
        <Package name="php">php-0:5.1.6-12.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0355">RHSA-2007:0355</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2509
https://nvd.nist.gov/vuln/detail/CVE-2007-2509
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2510">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-03T00:00:00</PublicDate>
    <Bugzilla id="239012" url="https://bugzilla.redhat.com/show_bug.cgi?id=239012" xml:lang="en:us">
php make_http_soap_request flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the make_http_soap_request function in PHP before 5.2.2 has unknown impact and remote attack vectors, possibly related to &quot;/&quot; (slash) characters.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or Red Hat Application Stack v2.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0348">RHSA-2007:0348</Advisory>
        <Package name="php">php-0:5.1.6-12.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-05-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0355">RHSA-2007:0355</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2510
https://nvd.nist.gov/vuln/detail/CVE-2007-2510
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2511">
    <PublicDate>2007-05-03T00:00:00</PublicDate>
    <Bugzilla id="239011" url="https://bugzilla.redhat.com/show_bug.cgi?id=239011" xml:lang="en:us">
php user_filter_factory_create overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the user_filter_factory_create function in PHP before 5.2.2 has unknown impact and local attack vectors.
    </Details>
    <Statement xml:lang="en:us">
The PHP interpreter does not offer a reliable &quot;sandboxed&quot; security layer (as found in, say, a JVM) in which untrusted scripts can be run any script run by the PHP interpreter must be trusted with the privileges of the interpreter itself. This bug described in CVE-2007-2511 can only be triggered by a script author since no trust boundary is crossed, this issue is not treated as security-sensitive.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2511
https://nvd.nist.gov/vuln/detail/CVE-2007-2511
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2519">
    <Bugzilla id="241218" url="https://bugzilla.redhat.com/show_bug.cgi?id=241218" xml:lang="en:us">
php-pear install root constraint bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.
    </Details>
    <Statement xml:lang="en:us">
Installation of a PEAR package from an untrusted source could allow malicious code to be installed and potentially executed by the root user. This is true regardless of the existence of this particular bug in the PEAR installer, so the bug would not be treated as security-sensitive. As when handling system RPM packages, the root user must always ensure that any packages installed are from a trusted source and have been packaged correctly.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2519
https://nvd.nist.gov/vuln/detail/CVE-2007-2519
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2525">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-08T00:00:00</PublicDate>
    <Bugzilla id="243262" url="https://bugzilla.redhat.com/show_bug.cgi?id=243262" xml:lang="en:us">
PPPoE socket PPPIOCGCHAN denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0376">RHSA-2007:0376</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2525
https://nvd.nist.gov/vuln/detail/CVE-2007-2525
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2583">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-29T00:00:00</PublicDate>
    <Bugzilla id="240813" url="https://bugzilla.redhat.com/show_bug.cgi?id=240813" xml:lang="en:us">
mysql: DoS via statement with crafted IF clause
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2583
https://nvd.nist.gov/vuln/detail/CVE-2007-2583
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2589">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-09T00:00:00</PublicDate>
    <Bugzilla id="239828" url="https://bugzilla.redhat.com/show_bug.cgi?id=239828" xml:lang="en:us">
CSRF through HTML message in squirrelmail
    </Bugzilla>
    <CWE>CWE-352</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site request forgery (CSRF) vulnerability in compose.php in SquirrelMail 1.4.0 through 1.4.9a allows remote attackers to send e-mails from arbitrary users via certain data in the SRC attribute of an IMG element.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-6.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0358">RHSA-2007:0358</Advisory>
        <Package name="squirrelmail">squirrelmail-0:1.4.8-4.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2589
https://nvd.nist.gov/vuln/detail/CVE-2007-2589
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2645">
    <PublicDate>2007-05-14T00:00:00</PublicDate>
    <Bugzilla id="240055" url="https://bugzilla.redhat.com/show_bug.cgi?id=240055" xml:lang="en:us">
Interger overflow in libexif
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw to have security consequences. For more details please see the following:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240055
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2645
https://nvd.nist.gov/vuln/detail/CVE-2007-2645
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2683">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-11T00:00:00</PublicDate>
    <Bugzilla id="239890" url="https://bugzilla.redhat.com/show_bug.cgi?id=239890" xml:lang="en:us">
Buffer overflow in mutt's gecos structure handling
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in Mutt 1.4.2 might allow local users to execute arbitrary code via &quot;&amp;&quot; characters in the GECOS field, which triggers the overflow during alias expansion.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.1-12.0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0386">RHSA-2007:0386</Advisory>
        <Package name="mutt">mutt-5:1.4.2.2-3.0.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2683
https://nvd.nist.gov/vuln/detail/CVE-2007-2683
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2691">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-17T00:00:00</PublicDate>
    <Bugzilla id="241688" url="https://bugzilla.redhat.com/show_bug.cgi?id=241688" xml:lang="en:us">
mysql DROP privilege not enforced when renaming tables
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0768">RHSA-2008:0768</Advisory>
        <Package name="mysql">mysql-0:4.1.22-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0894">RHSA-2007:0894</Advisory>
        <Package name="mysql">mysql-0:5.0.44-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2691
https://nvd.nist.gov/vuln/detail/CVE-2007-2691
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2692">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-17T00:00:00</PublicDate>
    <Bugzilla id="241689" url="https://bugzilla.redhat.com/show_bug.cgi?id=241689" xml:lang="en:us">
mysql SECURITY INVOKER functions do not drop privileges
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3 and 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0894">RHSA-2007:0894</Advisory>
        <Package name="mysql">mysql-0:5.0.44-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2692
https://nvd.nist.gov/vuln/detail/CVE-2007-2692
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2693">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-17T00:00:00</PublicDate>
    <Bugzilla id="241690" url="https://bugzilla.redhat.com/show_bug.cgi?id=241690" xml:lang="en:us">
An error message discloses sensitive information to user without SELECT privilege
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2693
https://nvd.nist.gov/vuln/detail/CVE-2007-2693
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2721">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-03-01T00:00:00</PublicDate>
    <Bugzilla id="346501" url="https://bugzilla.redhat.com/show_bug.cgi?id=346501" xml:lang="en:us">
jasper: crash in jpc_qcx_getcompparms
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect versions of ghostscript as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5 as they do not include a bundled JasPer library.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0012">RHSA-2009:0012</Advisory>
        <Package name="netpbm">netpbm-0:10.25-2.1.el4_7.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-02-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0012">RHSA-2009:0012</Advisory>
        <Package name="netpbm">netpbm-0:10.35-6.1.el5_3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2721
https://nvd.nist.gov/vuln/detail/CVE-2007-2721
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2727">
    <Details source="Mitre" xml:lang="en:us">
The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5, or Red Hat
Application Stack 1, or 2, as the packages shipped are not compiled with the mcrypt extension affected by this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2727
https://nvd.nist.gov/vuln/detail/CVE-2007-2727
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2741">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of lcms as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2741
https://nvd.nist.gov/vuln/detail/CVE-2007-2741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2748">
    <Details source="Mitre" xml:lang="en:us">
The substr_count function in PHP 5.2.1 and earlier allows context-dependent attackers to obtain sensitive information via unspecified vectors, a different affected function than CVE-2007-1375.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this flaw to be a security issue as it is only exploitable by the script author. No trust boundary is crossed.

This flaw exists in versions of PHP as shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack 1.

These issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or Red Hat Application Stack 2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2748
https://nvd.nist.gov/vuln/detail/CVE-2007-2748
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2754">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-27T00:00:00</PublicDate>
    <Bugzilla id="240200" url="https://bugzilla.redhat.com/show_bug.cgi?id=240200" xml:lang="en:us">
freetype integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0403">RHSA-2007:0403</Advisory>
        <Package name="freetype">freetype-0:2.0.3-10.el21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1062">RHSA-2009:1062</Advisory>
        <Package name="freetype">freetype-0:2.0.3-17.el21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0403">RHSA-2007:0403</Advisory>
        <Package name="freetype">freetype-0:2.1.4-7.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0329">RHSA-2009:0329</Advisory>
        <Package name="freetype">freetype-0:2.1.4-12.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0403">RHSA-2007:0403</Advisory>
        <Package name="freetype">freetype-0:2.1.9-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-05-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0329">RHSA-2009:0329</Advisory>
        <Package name="freetype">freetype-0:2.1.9-10.el4.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0403">RHSA-2007:0403</Advisory>
        <Package name="freetype">freetype-0:2.2.1-19.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2754
https://nvd.nist.gov/vuln/detail/CVE-2007-2754
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2756">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-16T00:00:00</PublicDate>
    <Bugzilla id="242033" url="https://bugzilla.redhat.com/show_bug.cgi?id=242033" xml:lang="en:us">
gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG
    </Bugzilla>
    <CWE>CWE-835</CWE>
    <Details source="Mitre" xml:lang="en:us">
The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates for libwmf in Red Hat Enterprise Linux 5 and 6. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2756
https://nvd.nist.gov/vuln/detail/CVE-2007-2756
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2764">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2019-08-14T00:00:00</PublicDate>
    <Bugzilla id="1758987" url="https://bugzilla.redhat.com/show_bug.cgi?id=1758987" xml:lang="en:us">
kernel: denial of service via unspecified vectors
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.1</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-400</CWE>
    <Details source="Mitre" xml:lang="en:us">
The embedded Linux kernel in certain Sun-Brocade SilkWorm switches before 20070516 does not properly handle a situation in which a non-root user creates a kernel process, which allows attackers to cause a denial of service (oops and device reboot) via unspecified vectors.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-alt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_mrg:2">
        <ProductName>Red Hat Enterprise MRG 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2764
https://nvd.nist.gov/vuln/detail/CVE-2007-2764
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2768">
    <Details source="Mitre" xml:lang="en:us">
OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. OPIE for PAM is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, 6, or 7.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2768
https://nvd.nist.gov/vuln/detail/CVE-2007-2768
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2788">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-05-21T00:00:00</PublicDate>
    <Bugzilla id="250725" url="https://bugzilla.redhat.com/show_bug.cgi?id=250725" xml:lang="en:us">
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1086">RHSA-2007:1086</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2788
https://nvd.nist.gov/vuln/detail/CVE-2007-2788
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2789">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-05-21T00:00:00</PublicDate>
    <Bugzilla id="250729" url="https://bugzilla.redhat.com/show_bug.cgi?id=250729" xml:lang="en:us">
BMP image parser vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1086">RHSA-2007:1086</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0817">RHSA-2007:0817</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.9-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2789
https://nvd.nist.gov/vuln/detail/CVE-2007-2789
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2797">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-12-19T00:00:00</PublicDate>
    <Bugzilla id="239070" url="https://bugzilla.redhat.com/show_bug.cgi?id=239070" xml:lang="en:us">
(mesg: error: tty device is not owned by group `tty')
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
xterm, including 192-7.el4 in Red Hat Enterprise Linux and 208-3.1 in Debian GNU/Linux, sets the wrong group ownership of tty devices, which allows local users to write data to other users' terminals.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0701">RHSA-2007:0701</Advisory>
        <Package name="xterm">xterm-0:192-8.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2797
https://nvd.nist.gov/vuln/detail/CVE-2007-2797
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2798">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-26T00:00:00</PublicDate>
    <Bugzilla id="245549" url="https://bugzilla.redhat.com/show_bug.cgi?id=245549" xml:lang="en:us">
krb5 kadmind buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the rename_principal_2_svc function in kadmind for MIT Kerberos 1.5.3, 1.6.1, and other versions allows remote authenticated users to execute arbitrary code via a crafted request to rename a principal.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.2-47</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0384">RHSA-2007:0384</Advisory>
        <Package name="krb5">krb5-0:1.2.7-66</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.3.4-49</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0562">RHSA-2007:0562</Advisory>
        <Package name="krb5">krb5-0:1.5-26</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2798
https://nvd.nist.gov/vuln/detail/CVE-2007-2798
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2799">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-05-23T00:00:00</PublicDate>
    <Bugzilla id="241022" url="https://bugzilla.redhat.com/show_bug.cgi?id=241022" xml:lang="en:us">
file integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the &quot;file&quot; program 4.20, when running on 32-bit systems, as used in products including The Sleuth Kit, might allow user-assisted attackers to execute arbitrary code via a large file that triggers an overflow that bypasses an assert() statement.  NOTE: this issue is due to an incorrect patch for CVE-2007-1536.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0391">RHSA-2007:0391</Advisory>
        <Package name="file">file-0:4.10-3.0.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0391">RHSA-2007:0391</Advisory>
        <Package name="file">file-0:4.17-9.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2799
https://nvd.nist.gov/vuln/detail/CVE-2007-2799
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2833">
    <Details source="Mitre" xml:lang="en:us">
Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user-assisted crash of a user application such as Emacs to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2833
https://nvd.nist.gov/vuln/detail/CVE-2007-2833
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2834">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-17T00:00:00</PublicDate>
    <Bugzilla id="251967" url="https://bugzilla.redhat.com/show_bug.cgi?id=251967" xml:lang="en:us">
openoffice.org TIFF parsing heap overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the TIFF parser in OpenOffice.org (OOo) before 2.3; and Sun StarOffice 6, 7, and 8 Office Suite (StarSuite); allows remote attackers to execute arbitrary code via a TIFF file with crafted values of unspecified length fields, which triggers allocation of an incorrect amount of memory, resulting in a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0848">RHSA-2007:0848</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.2-40.2.0.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0848">RHSA-2007:0848</Advisory>
        <Package name="openoffice.org">openoffice.org-0:1.1.5-10.6.0.2.EL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0848">RHSA-2007:0848</Advisory>
        <Package name="openoffice.org2">openoffice.org2-1:2.0.4-5.7.0.2.0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0848">RHSA-2007:0848</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.17.3</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2834
https://nvd.nist.gov/vuln/detail/CVE-2007-2834
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2844">
    <Bugzilla id="241641" url="https://bugzilla.redhat.com/show_bug.cgi?id=241641" xml:lang="en:us">
php crypt function not re-entrant
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP 4.x and 5.x before 5.2.1, when running on multi-threaded systems, does not ensure thread safety for libc crypt function calls using protection schemes such as a mutex, which creates race conditions that allow remote attackers to overwrite internal program memory and gain system access.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP is not built or supported in a multi-threaded environment in the packages distributed in Red Hat Enterprise Linux or Application Stack.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2844
https://nvd.nist.gov/vuln/detail/CVE-2007-2844
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2867">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-31T00:00:00</PublicDate>
    <Bugzilla id="241840" url="https://bugzilla.redhat.com/show_bug.cgi?id=241840" xml:lang="en:us">
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2867
https://nvd.nist.gov/vuln/detail/CVE-2007-2867
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2868">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-05-31T00:10:00</PublicDate>
    <Bugzilla id="1618369" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618369" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2868
https://nvd.nist.gov/vuln/detail/CVE-2007-2868
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2869">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-31T00:00:00</PublicDate>
    <Bugzilla id="241840" url="https://bugzilla.redhat.com/show_bug.cgi?id=241840" xml:lang="en:us">
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2869
https://nvd.nist.gov/vuln/detail/CVE-2007-2869
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2870">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-31T00:00:00</PublicDate>
    <Bugzilla id="1618370" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618370" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2870
https://nvd.nist.gov/vuln/detail/CVE-2007-2870
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2871">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-31T00:00:00</PublicDate>
    <Bugzilla id="241840" url="https://bugzilla.redhat.com/show_bug.cgi?id=241840" xml:lang="en:us">
Multiple Firefox flaws (CVE-2007-1562, CVE-2007-2867, CVE-2007-2868, CVE-2007-2869, CVE-2007-2870, CVE-2007-2871)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="devhelp">devhelp-0:0.10-0.8.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0402">RHSA-2007:0402</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="devhelp">devhelp-0:0.12-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0400">RHSA-2007:0400</Advisory>
        <Package name="yelp">yelp-0:2.16.0-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-05-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0401">RHSA-2007:0401</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2871
https://nvd.nist.gov/vuln/detail/CVE-2007-2871
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2872">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-01T00:00:00</PublicDate>
    <Bugzilla id="242032" url="https://bugzilla.redhat.com/show_bug.cgi?id=242032" xml:lang="en:us">
php chunk_split integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0888">RHSA-2007:0888</Advisory>
        <Package name="php">php-0:4.1.2-2.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2872
https://nvd.nist.gov/vuln/detail/CVE-2007-2872
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2873">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-11T00:00:00</PublicDate>
    <Bugzilla id="243455" url="https://bugzilla.redhat.com/show_bug.cgi?id=243455" xml:lang="en:us">
spamassassin symlink attack
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
SpamAssassin 3.1.x, 3.2.0, and 3.2.1 before 20070611, when running as root in unusual configurations using vpopmail or virtual users, allows local users to cause a denial of service (corrupt arbitrary files) via a symlink attack on a file that is used by spamd.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0492">RHSA-2007:0492</Advisory>
        <Package name="spamassassin">spamassassin-0:3.1.9-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0492">RHSA-2007:0492</Advisory>
        <Package name="spamassassin">spamassassin-0:3.1.9-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2873
https://nvd.nist.gov/vuln/detail/CVE-2007-2873
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2875">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-07T00:00:00</PublicDate>
    <Bugzilla id="245773" url="https://bugzilla.redhat.com/show_bug.cgi?id=245773" xml:lang="en:us">
cpuset information leak
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2875
https://nvd.nist.gov/vuln/detail/CVE-2007-2875
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2876">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-07T00:00:00</PublicDate>
    <Bugzilla id="245774" url="https://bugzilla.redhat.com/show_bug.cgi?id=245774" xml:lang="en:us">
nf}_conntrack_sctp: remotely triggerable NULL ptr dereference
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2876
https://nvd.nist.gov/vuln/detail/CVE-2007-2876
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2878">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-08T00:00:00</PublicDate>
    <Bugzilla id="247726" url="https://bugzilla.redhat.com/show_bug.cgi?id=247726" xml:lang="en:us">
VFAT compat ioctls DoS on 64-bit
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2878
https://nvd.nist.gov/vuln/detail/CVE-2007-2878
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2893">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-20T00:00:00</PublicDate>
    <Bugzilla id="237347" url="https://bugzilla.redhat.com/show_bug.cgi?id=237347" xml:lang="en:us">
xen NE2000 RX Frame Heap Overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the bx_ne2k_c::rx_frame function in iodev/ne2k.cc in the emulated NE2000 device in Bochs 2.3 allows local users of the guest operating system to write to arbitrary memory locations and gain privileges on the host operating system via vectors that cause TXCNT register values to exceed the device memory size, aka &quot;RX Frame heap overflow.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect Xen as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2893
https://nvd.nist.gov/vuln/detail/CVE-2007-2893
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2925">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-23T00:00:00</PublicDate>
    <Bugzilla id="248850" url="https://bugzilla.redhat.com/show_bug.cgi?id=248850" xml:lang="en:us">
bind allow-query-cache/allow-recursion default ACL issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issu did not affect the versions of bind as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2925
https://nvd.nist.gov/vuln/detail/CVE-2007-2925
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2926">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-23T00:00:00</PublicDate>
    <Bugzilla id="248851" url="https://bugzilla.redhat.com/show_bug.cgi?id=248851" xml:lang="en:us">
bind cryptographically weak query ids
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Amit Klein (Trusteer (www.trusteer.com)) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0740">RHSA-2007:0740</Advisory>
        <Package name="bind">bind-0:9.2.1-9.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0740">RHSA-2007:0740</Advisory>
        <Package name="bind">bind-20:9.2.4-21.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0740">RHSA-2007:0740</Advisory>
        <Package name="bind">bind-20:9.2.4-27.0.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0740">RHSA-2007:0740</Advisory>
        <Package name="bind">bind-30:9.3.3-9.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2926
https://nvd.nist.gov/vuln/detail/CVE-2007-2926
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2930">
    <Details source="Mitre" xml:lang="en:us">
The (1) NSID_SHUFFLE_ONLY and (2) NSID_USE_POOL PRNG algorithms in ISC BIND 8 before 8.4.7-P1 generate predictable DNS query identifiers when sending outgoing queries such as NOTIFY messages when answering questions as a resolver, which allows remote attackers to poison DNS caches via unknown vectors.  NOTE: this issue is different from CVE-2007-2926.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of bind as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2930
https://nvd.nist.gov/vuln/detail/CVE-2007-2930
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2949">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-27T00:00:00</PublicDate>
    <Bugzilla id="244400" url="https://bugzilla.redhat.com/show_bug.cgi?id=244400" xml:lang="en:us">
Gimp PSD integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.1-7.8.el2_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.3-20.9.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:2.0.5-7.0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-2:2.2.13-2.0.7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2949
https://nvd.nist.gov/vuln/detail/CVE-2007-2949
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2953">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-25T00:00:00</PublicDate>
    <Bugzilla id="248542" url="https://bugzilla.redhat.com/show_bug.cgi?id=248542" xml:lang="en:us">
vim format string flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248542

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0617">RHSA-2008:0617</Advisory>
        <Package name="vim">vim-1:6.3.046-0.30E.11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0617">RHSA-2008:0617</Advisory>
        <Package name="vim">vim-1:6.3.046-1.el4_7.5z</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-11-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0580">RHSA-2008:0580</Advisory>
        <Package name="vim">vim-2:7.0.109-4.el5_2.4z</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2953
https://nvd.nist.gov/vuln/detail/CVE-2007-2953
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-2958">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-08-23T00:00:00</PublicDate>
    <Bugzilla id="254121" url="https://bugzilla.redhat.com/show_bug.cgi?id=254121" xml:lang="en:us">
CVE-2007-2958 claws-mail format string vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Format string vulnerability in the inc_put_error function in src/inc.c in Sylpheed 2.4.4, and Sylpheed-Claws (Claws Mail) 1.9.100 and 2.10.0, allows remote POP3 servers to execute arbitrary code via format string specifiers in crafted replies.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This issue did not affect version of Sylpheed as shipped with Red Hat Enterprise Linux 2.1.  Sylpheed and claws-mail are not shipped with Red Hat Enterprise Linux 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-2958
https://nvd.nist.gov/vuln/detail/CVE-2007-2958
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3004">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-04-15T00:00:00</PublicDate>
    <Bugzilla id="242595" url="https://bugzilla.redhat.com/show_bug.cgi?id=242595" xml:lang="en:us">
IBM JDK: Integer overflow in IBM JDK's ICC profile parser
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Red Hat" xml:lang="en:us">
[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2788. Note: All CVE users should reference CVE-2007-2788 instead of this candidate.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3004
https://nvd.nist.gov/vuln/detail/CVE-2007-3004
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3005">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-04-15T00:00:00</PublicDate>
    <Bugzilla id="250733" url="https://bugzilla.redhat.com/show_bug.cgi?id=250733" xml:lang="en:us">
SUN JRE: Unspecified vulnerability in Sun JRE
    </Bugzilla>
    <Details source="Red Hat" xml:lang="en:us">
[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2007-2789. Note: All CVE users should reference CVE-2007-2789 instead of this candidate.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-17</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3005
https://nvd.nist.gov/vuln/detail/CVE-2007-3005
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3007">
    <Details source="Mitre" xml:lang="en:us">
PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string.  NOTE: this issue might also involve the realpath function.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues.  For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3007
https://nvd.nist.gov/vuln/detail/CVE-2007-3007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3008">
    <Details source="Mitre" xml:lang="en:us">
Mbedthis AppWeb before 2.2.2 enables the HTTP TRACE method, which has unspecified impact probably related to remote information leaks and cross-site tracing (XST) attacks, a related issue to CVE-2004-2320 and CVE-2005-3398.
    </Details>
    <Statement xml:lang="en:us">
The Apache Software Foundation do not treat this as a security issue. A configuration change can be made to disable the ability to respond to HTTP TRACE requests if required.

For more information please see:
http://www.apacheweek.com/issues/03-01-24#news
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3008
https://nvd.nist.gov/vuln/detail/CVE-2007-3008
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3089">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-04T00:00:00</PublicDate>
    <Bugzilla id="1618309" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618309" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the &quot;promiscuous IFRAME access bug,&quot; a related issue to CVE-2006-4568.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3089
https://nvd.nist.gov/vuln/detail/CVE-2007-3089
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3099">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-11T00:00:00</PublicDate>
    <Bugzilla id="243719" url="https://bugzilla.redhat.com/show_bug.cgi?id=243719" xml:lang="en:us">
dos flaws in open-iscsi (CVE-2007-3100)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
usr/mgmt_ipc.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 checks the client's UID on the listening AF_LOCAL socket instead of the new connection, which allows remote attackers to access the management interface and cause a denial of service (iscsid exit or iSCSI connection loss).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0497">RHSA-2007:0497</Advisory>
        <Package name="iscsi-initiator-utils">iscsi-initiator-utils-0:6.2.0.742-0.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3099
https://nvd.nist.gov/vuln/detail/CVE-2007-3099
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3100">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-11T00:00:00</PublicDate>
    <Bugzilla id="243719" url="https://bugzilla.redhat.com/show_bug.cgi?id=243719" xml:lang="en:us">
dos flaws in open-iscsi (CVE-2007-3100)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
usr/log.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 uses a semaphore with insecure permissions (world-writable/world-readable) for managing log messages using shared memory, which allows local users to cause a denial of service (hang) by grabbing the semaphore.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0497">RHSA-2007:0497</Advisory>
        <Package name="iscsi-initiator-utils">iscsi-initiator-utils-0:6.2.0.742-0.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3100
https://nvd.nist.gov/vuln/detail/CVE-2007-3100
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3102">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="243204" url="https://bugzilla.redhat.com/show_bug.cgi?id=243204" xml:lang="en:us">
audit logging of failed logins
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the linux_audit_record_event function in OpenSSH 4.3p2, as used on Fedora Core 6 and possibly other systems, allows remote attackers to write arbitrary characters to an audit log via a crafted username.  NOTE: some of these details are obtained from third party information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0703">RHSA-2007:0703</Advisory>
        <Package name="openssh">openssh-0:3.9p1-8.RHEL4.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0737">RHSA-2007:0737</Advisory>
        <Package name="pam">pam-0:0.77-66.23</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0540">RHSA-2007:0540</Advisory>
        <Package name="openssh">openssh-0:4.3p2-24.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0555">RHSA-2007:0555</Advisory>
        <Package name="pam">pam-0:0.99.6.2-3.26.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3102
https://nvd.nist.gov/vuln/detail/CVE-2007-3102
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3103">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-11T00:00:00</PublicDate>
    <Bugzilla id="1618310" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618310" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0519">RHSA-2007:0519</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0520">RHSA-2007:0520</Advisory>
        <Package name="xorg-x11-xfs">xorg-x11-xfs-1:1.0.2-4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3103
https://nvd.nist.gov/vuln/detail/CVE-2007-3103
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3104">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-22T00:00:00</PublicDate>
    <Bugzilla id="427994" url="https://bugzilla.redhat.com/show_bug.cgi?id=427994" xml:lang="en:us">
Null pointer to an inode in a dentry can cause an oops in sysfs_readdir
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0488">RHSA-2007:0488</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.2.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0089">RHSA-2008:0089</Advisory>
        <Package name="kernel">kernel-0:2.6.18-53.1.6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3104
https://nvd.nist.gov/vuln/detail/CVE-2007-3104
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3105">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="248325" url="https://bugzilla.redhat.com/show_bug.cgi?id=248325" xml:lang="en:us">
Bound check ordering issue in random driver
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving &quot;bound check ordering&quot;.  NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3105
https://nvd.nist.gov/vuln/detail/CVE-2007-3105
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3106">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-26T00:00:00</PublicDate>
    <Bugzilla id="245991" url="https://bugzilla.redhat.com/show_bug.cgi?id=245991" xml:lang="en:us">
libvorbis array boundary condition
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a &quot;heap overwrite&quot; in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0912">RHSA-2007:0912</Advisory>
        <Package name="libvorbis">libvorbis-0:1.0rc2-7.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.0-8.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.0-2.el4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.2-3.el5.0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3106
https://nvd.nist.gov/vuln/detail/CVE-2007-3106
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3107">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-03T00:00:00</PublicDate>
    <Bugzilla id="1618313" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618313" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The signal handling in the Linux kernel before 2.6.22, including 2.6.2, when running on PowerPC systems using HTX, allows local users to cause a denial of service via unspecified vectors involving floating point corruption and concurrency, related to clearing of MSR bits.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0595">RHSA-2007:0595</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.8.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3107
https://nvd.nist.gov/vuln/detail/CVE-2007-3107
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3108">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-01T00:00:00</PublicDate>
    <Bugzilla id="245732" url="https://bugzilla.redhat.com/show_bug.cgi?id=245732" xml:lang="en:us">
openssl: RSA side-channel attack
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0813">RHSA-2007:0813</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-48</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0813">RHSA-2007:0813</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1003">RHSA-2007:1003</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0964">RHSA-2007:0964</Advisory>
        <Package name="openssl">openssl-0:0.9.8b-8.3.el5_0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3108
https://nvd.nist.gov/vuln/detail/CVE-2007-3108
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3126">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2022-02-07T00:00:00</PublicDate>
    <Bugzilla id="2051868" url="https://bugzilla.redhat.com/show_bug.cgi?id=2051868" xml:lang="en:us">
Gimp: context-dependent attackers to cause a denial of service
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>7.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-400</CWE>
    <Details source="Mitre" xml:lang="en:us">
Gimp before 2.8.22 allows context-dependent attackers to cause a denial of service (crash) via an ICO file with an InfoHeader containing a Height of zero, a similar issue to CVE-2007-2237.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user-assisted crash of a user application such as GIMP to be a security issue.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>gimp</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gimp</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gimp:2.8/gimp</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>gimp:flatpak/gimp</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3126
https://nvd.nist.gov/vuln/detail/CVE-2007-3126
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3143">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-06T00:00:00</PublicDate>
    <Bugzilla id="252169" url="https://bugzilla.redhat.com/show_bug.cgi?id=252169" xml:lang="en:us">
konqueror visual hostname truncation in HTTP authentication dialog
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-222</CWE>
    <Details source="Mitre" xml:lang="en:us">
Visual truncation vulnerability in Konqueror 3.5.5 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>kdebase</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>kdebase</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>kdebase</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3143
https://nvd.nist.gov/vuln/detail/CVE-2007-3143
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3144">
    <Details source="Mitre" xml:lang="en:us">
Visual truncation vulnerability in Mozilla 1.7.12 allows remote attackers to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authentication.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Mozilla is no longer shipped as part of any version of Red Hat Enterprise Linux.  Mozilla was replaced by SeaMonkey in Red Hat Enterprise Linux by SeaMonkey which is not affected by this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3144
https://nvd.nist.gov/vuln/detail/CVE-2007-3144
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3149">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-06T00:00:00</PublicDate>
    <Bugzilla id="243702" url="https://bugzilla.redhat.com/show_bug.cgi?id=243702" xml:lang="en:us">
Local authentication bypass in sudo
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings.  NOTE: another researcher disputes this vulnerability, stating that the attacker must be &quot;a user, who can already log into your system, and can already use sudo.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Versions of sudo package shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5 are linked with PAM support and never use libkrb5 authentication.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3149
https://nvd.nist.gov/vuln/detail/CVE-2007-3149
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3205">
    <Details source="Mitre" xml:lang="en:us">
The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed.  NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
    </Details>
    <Statement xml:lang="en:us">
This is not a security vulnerability: it is the expected behaviour of parse_str when used without a second parameter.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3205
https://nvd.nist.gov/vuln/detail/CVE-2007-3205
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3257">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-14T00:00:00</PublicDate>
    <Bugzilla id="244277" url="https://bugzilla.redhat.com/show_bug.cgi?id=244277" xml:lang="en:us">
evolution malicious server arbitrary code execution
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0509">RHSA-2007:0509</Advisory>
        <Package name="evolution">evolution-0:1.4.5-21.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0509">RHSA-2007:0509</Advisory>
        <Package name="evolution">evolution-0:2.0.2-35.0.4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0510">RHSA-2007:0510</Advisory>
        <Package name="evolution-data-server">evolution-data-server-0:1.8.0-15.0.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3257
https://nvd.nist.gov/vuln/detail/CVE-2007-3257
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3278">
    <PublicDate>2007-06-16T00:00:00</PublicDate>
    <Bugzilla id="309141" url="https://bugzilla.redhat.com/show_bug.cgi?id=309141" xml:lang="en:us">
dblink allows proxying of database connections via 127.0.0.1
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.1 and probably later versions, when local trust authentication is enabled and the Database Link library (dblink) is installed, allows remote attackers to access arbitrary accounts and execute arbitrary SQL queries via a dblink host parameter that proxies the connection from 127.0.0.1.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this do be a security issue. dblink is disabled in default configuration of PostgreSQL packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5, and it is a configuration decision whether to grant local users arbitrary access.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0039">RHSA-2008:0039</Advisory>
        <Package name="rh-postgresql">rh-postgresql-0:7.3.21-1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:7.4.19-1.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0040">RHSA-2008:0040</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3278
https://nvd.nist.gov/vuln/detail/CVE-2007-3278
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3279">
    <Bugzilla id="309151" url="https://bugzilla.redhat.com/show_bug.cgi?id=309151" xml:lang="en:us">
Functions in PL/pgSQL language can be used to brute force passwords
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PostgreSQL 8.1 and probably later versions, when the PL/pgSQL (plpgsql) language has been created, grants certain plpgsql privileges to the PUBLIC domain, which allows remote attackers to create and execute functions, as demonstrated by functions that perform local brute-force password guessing attacks, which may evade intrusion detection.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this do be a security issue. Creating functions is intended feature of the PL/pgSQL language and is definitely not a security problem. Weak passwords are generally more likely to be guessed with brute force attacks and choosing a strong password according to good practices is considered to be a sufficent protection against this kind of attack.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3279
https://nvd.nist.gov/vuln/detail/CVE-2007-3279
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3280">
    <Bugzilla id="309161" url="https://bugzilla.redhat.com/show_bug.cgi?id=309161" xml:lang="en:us">
Database superuser can execute code on behalf of postgresql server
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Database Link library (dblink) in PostgreSQL 8.1 implements functions via CREATE statements that map to arbitrary libraries based on the C programming language, which allows remote authenticated superusers to map and execute a function from any library, as demonstrated by using the system function in libc.so.6 to gain shell access.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this do be a security issue. The ability of the superuser to execute code on behalf of the database server is an intended feature and imposes no security threat as the superuser account is restricted to the database administrator.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3280
https://nvd.nist.gov/vuln/detail/CVE-2007-3280
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3294">
    <PublicDate>2007-06-19T00:00:00</PublicDate>
    <Bugzilla id="306821" url="https://bugzilla.redhat.com/show_bug.cgi?id=306821" xml:lang="en:us">
php tidy extension buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in libtidy, as used in the Tidy extension for PHP 5.2.3 and possibly other products, allow context-dependent attackers to execute arbitrary code via (1) a long second argument to the tidy_parse_string function or (2) an unspecified vector to the tidy_repair_string function.  NOTE: this might only be an issue in environments where vsnprintf is implemented as a wrapper for vsprintf.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. PHP is not complied with the tidy library as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5, or Red Hat Application Stack v1 or v2.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3294
https://nvd.nist.gov/vuln/detail/CVE-2007-3294
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3303">
    <Details source="Mitre" xml:lang="en:us">
Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes.  NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
    </Details>
    <Statement xml:lang="en:us">
Not a vulnerability.  In the security model used by Apache httpd, the less-privileged child processes (running as the &quot;apache&quot; user) completely handle the servicing of new connections. Any local user who is able to run arbitrary code in those children is therefore able to prevent new requests from being serviced, by design.  Such users will also be able to &quot;simulate&quot; server load and force the parent to create children up to the configured limits, by design.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3303
https://nvd.nist.gov/vuln/detail/CVE-2007-3303
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3304">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-19T00:00:00</PublicDate>
    <Bugzilla id="245111" url="https://bugzilla.redhat.com/show_bug.cgi?id=245111" xml:lang="en:us">
httpd scoreboard lack of PID protection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka &quot;SIGUSR1 killer.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0532">RHSA-2007:0532</Advisory>
        <Package name="apache">apache-0:1.3.27-12.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0662">RHSA-2007:0662</Advisory>
        <Package name="httpd">httpd-0:2.0.46-68.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0662">RHSA-2007:0662</Advisory>
        <Package name="httpd">httpd-0:2.0.52-32.3.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0556">RHSA-2007:0556</Advisory>
        <Package name="httpd">httpd-0:2.2.3-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-07-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0557">RHSA-2007:0557</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.7</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3304
https://nvd.nist.gov/vuln/detail/CVE-2007-3304
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3372">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-22T00:00:00</PublicDate>
    <Bugzilla id="245586" url="https://bugzilla.redhat.com/show_bug.cgi?id=245586" xml:lang="en:us">
avahi: assert fail local DoS via D-Bus
    </Bugzilla>
    <CVSS status="draft">
        <CVSSBaseScore>2.1</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:L/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of avahi as shipped with Red Hat Enterprise Linux 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3372
https://nvd.nist.gov/vuln/detail/CVE-2007-3372
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3374">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-19T00:00:00</PublicDate>
    <Bugzilla id="244891" url="https://bugzilla.redhat.com/show_bug.cgi?id=244891" xml:lang="en:us">
possible buffer overflow could cause local DoS by crashing cman
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in cluster/cman/daemon/daemon.c in cman (redhat-cluster-suite) before 20070622 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via long client messages.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-06-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0559">RHSA-2007:0559</Advisory>
        <Package name="cman">cman-0:2.0.64-1.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3374
https://nvd.nist.gov/vuln/detail/CVE-2007-3374
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3375">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-01T00:00:00</PublicDate>
    <Bugzilla id="247599" url="https://bugzilla.redhat.com/show_bug.cgi?id=247599" xml:lang="en:us">
lhaca issue might affect lha packages
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in Lhaca File Archiver before 1.21 allows user-assisted remote attackers to execute arbitrary code via a crafted LZH archive, as exploited by malware such as Trojan.Lhdropper.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable, Red Hat do not ship the Lhaca file archiver. Note that an identical flaw was found affecting the lha file archiver in 2004, CVE-2004-0234. This issue was corrected by security update RHSA-2004:178 for Red Hat Enterprise Linux 2.1 and 3. Red Hat Enterprise Linux 4 was not vulnerable as it contained a backported patch to correct this issue from release.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3375
https://nvd.nist.gov/vuln/detail/CVE-2007-3375
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3377">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-22T00:00:00</PublicDate>
    <Bugzilla id="245466" url="https://bugzilla.redhat.com/show_bug.cgi?id=245466" xml:lang="en:us">
perl-Net-DNS security issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0674">RHSA-2007:0674</Advisory>
        <Package name="perl-Net-DNS">perl-Net-DNS-0:0.31-4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0675">RHSA-2007:0675</Advisory>
        <Package name="perl-Net-DNS">perl-Net-DNS-0:0.48-2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0674">RHSA-2007:0674</Advisory>
        <Package name="perl-Net-DNS">perl-Net-DNS-0:0.59-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3377
https://nvd.nist.gov/vuln/detail/CVE-2007-3377
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3378">
    <Bugzilla id="278071" url="https://bugzilla.redhat.com/show_bug.cgi?id=278071" xml:lang="en:us">
php session.save_path/error_log safe mode bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be security issues. For more details see: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3378
https://nvd.nist.gov/vuln/detail/CVE-2007-3378
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3379">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-05-01T00:00:00</PublicDate>
    <Bugzilla id="1618314" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618314" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0304">RHBA-2007:0304</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3379
https://nvd.nist.gov/vuln/detail/CVE-2007-3379
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3380">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-26T00:00:00</PublicDate>
    <Bugzilla id="1618315" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618315" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Distributed Lock Manager (DLM) in the cluster manager for Linux kernel 2.6.15 allows remote attackers to cause a denial of service (loss of lock services) by connecting to the DLM port, which probably prevents other processes from accessing the service.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_cluster:4">
        <ProductName>CLuster Suite for RHEL 4</ProductName>
        <ReleaseDate>2007-09-05T00:00:00</ReleaseDate>
        <Advisory type="RHBA" url="https://access.redhat.com/errata/RHBA-2007:0861">RHBA-2007:0861</Advisory>
        <Package name="dlm-kernel">dlm-kernel-0:2.6.9-46.16.0.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3380
https://nvd.nist.gov/vuln/detail/CVE-2007-3380
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3381">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-30T00:00:00</PublicDate>
    <Bugzilla id="247655" url="https://bugzilla.redhat.com/show_bug.cgi?id=247655" xml:lang="en:us">
Gdm denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank JLANTHEA for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0777">RHSA-2007:0777</Advisory>
        <Package name="gdm">gdm-1:2.16.0-31.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3381
https://nvd.nist.gov/vuln/detail/CVE-2007-3381
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3382">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-14T00:00:00</PublicDate>
    <Bugzilla id="247972" url="https://bugzilla.redhat.com/show_bug.cgi?id=247972" xml:lang="en:us">
tomcat handling of cookies
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (&quot;'&quot;) as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2008-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0195">RHSA-2008:0195</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_11rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0871">RHSA-2007:0871</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.3.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="berkeleydb">berkeleydb-0:2.0.90-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-annotations">hibernate3-annotations-0:3.2.1-1.patch01.1jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-ejb-persistence-3.0-api">hibernate3-ejb-persistence-3.0-api-0:3.2.1-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-entitymanager">hibernate3-entitymanager-0:3.2.1-1jpp.ep1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jacorb">jacorb-0:2.3.0-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-aop">jboss-aop-0:1.5.5-0jpp.ep1.2.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossas">jbossas-0:4.2.0-2.CP01.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-cache">jboss-cache-0:1.4.1-1.SP3.1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-remoting">jboss-remoting-0:2.2.2-1jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-seam">jboss-seam-0:1.2.1-1.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-serialization">jboss-serialization-0:1.0.3-1jpp.ep1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossweb">jbossweb-0:2.0.0-2.CP01.0jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossxb">jbossxb-0:1.0.0-1.CP01.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jcommon">jcommon-0:0.9.7-1jpp.el4ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.21-2jpp.el4ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="rh-eap-docs">rh-eap-docs-0:4.2.0-2.CP01.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3382
https://nvd.nist.gov/vuln/detail/CVE-2007-3382
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3385">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-14T00:00:00</PublicDate>
    <Bugzilla id="247976" url="https://bugzilla.redhat.com/show_bug.cgi?id=247976" xml:lang="en:us">
tomcat handling of cookie values
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \&quot; character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_developer_suite:3">
        <ProductName>Red Hat Developer Suite V.3</ProductName>
        <ReleaseDate>2008-04-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0195">RHSA-2008:0195</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_11rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0871">RHSA-2007:0871</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.3.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el4">
        <ProductName>Red Hat Network Satellite Server v 4.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.0::el3">
        <ProductName>Red Hat Network Satellite Server v 4.0 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el4">
        <ProductName>Red Hat Network Satellite Server v 4.1</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.1::el3">
        <ProductName>Red Hat Network Satellite Server v 4.1 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="jakarta-commons-pool">jakarta-commons-pool-0:1.2-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-11-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1069">RHSA-2007:1069</Advisory>
        <Package name="tyrex">tyrex-0:1.0.1-2jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="berkeleydb">berkeleydb-0:2.0.90-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-annotations">hibernate3-annotations-0:3.2.1-1.patch01.1jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-ejb-persistence-3.0-api">hibernate3-ejb-persistence-3.0-api-0:3.2.1-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="hibernate3-entitymanager">hibernate3-entitymanager-0:3.2.1-1jpp.ep1.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jacorb">jacorb-0:2.3.0-1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-aop">jboss-aop-0:1.5.5-0jpp.ep1.2.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossas">jbossas-0:4.2.0-2.CP01.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-cache">jboss-cache-0:1.4.1-1.SP3.1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-remoting">jboss-remoting-0:2.2.2-1jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-seam">jboss-seam-0:1.2.1-1.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jboss-serialization">jboss-serialization-0:1.0.3-1jpp.ep1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossweb">jbossweb-0:2.0.0-2.CP01.0jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jbossxb">jbossxb-0:1.0.0-1.CP01.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jcommon">jcommon-0:0.9.7-1jpp.el4ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.21-2jpp.el4ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0950">RHSA-2007:0950</Advisory>
        <Package name="rh-eap-docs">rh-eap-docs-0:4.2.0-2.CP01.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3385
https://nvd.nist.gov/vuln/detail/CVE-2007-3385
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3386">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-14T00:00:00</PublicDate>
    <Bugzilla id="247994" url="https://bugzilla.redhat.com/show_bug.cgi?id=247994" xml:lang="en:us">
tomcat host manager xss
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0871">RHSA-2007:0871</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp.3.0.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_server:2">
        <ProductName>RHAPS Version 2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0876">RHSA-2007:0876</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3386
https://nvd.nist.gov/vuln/detail/CVE-2007-3386
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3387">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-28T00:00:00</PublicDate>
    <Bugzilla id="248194" url="https://bugzilla.redhat.com/show_bug.cgi?id=248194" xml:lang="en:us">
xpdf integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-08-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0731">RHSA-2007:0731</Advisory>
        <Package name="tetex">tetex-0:1.0.7-38.5E.11</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0735">RHSA-2007:0735</Advisory>
        <Package name="xpdf">xpdf-1:0.92-18.RHEL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0720">RHSA-2007:0720</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.45</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-08-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0731">RHSA-2007:0731</Advisory>
        <Package name="tetex">tetex-0:1.0.7-67.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0735">RHSA-2007:0735</Advisory>
        <Package name="xpdf">xpdf-1:2.02-10.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0720">RHSA-2007:0720</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.20.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0729">RHSA-2007:0729</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-4.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0730">RHSA-2007:0730</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-08-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0731">RHSA-2007:0731</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.0.1.EL4.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0735">RHSA-2007:0735</Advisory>
        <Package name="xpdf">xpdf-1:3.00-12.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0720">RHSA-2007:0720</Advisory>
        <Package name="cups">cups-1:1.2.4-11.5.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0729">RHSA-2007:0729</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.5.4-2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0731">RHSA-2007:0731</Advisory>
        <Package name="tetex">tetex-0:3.0-33.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0732">RHSA-2007:0732</Advisory>
        <Package name="poppler">poppler-0:0.5.4-4.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3387
https://nvd.nist.gov/vuln/detail/CVE-2007-3387
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3388">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-27T00:00:00</PublicDate>
    <Bugzilla id="248417" url="https://bugzilla.redhat.com/show_bug.cgi?id=248417" xml:lang="en:us">
qt3 format string flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Dirk Mueller and Tim Brown (Portcullis Computer Security) for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0721">RHSA-2007:0721</Advisory>
        <Package name="qt">qt-1:3.1.2-16.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0721">RHSA-2007:0721</Advisory>
        <Package name="qt">qt-1:3.3.3-11.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0721">RHSA-2007:0721</Advisory>
        <Package name="qt">qt-1:3.3.6-21.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3388
https://nvd.nist.gov/vuln/detail/CVE-2007-3388
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3389">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-22T00:00:00</PublicDate>
    <Bugzilla id="245796" url="https://bugzilla.redhat.com/show_bug.cgi?id=245796" xml:lang="en:us">
Wireshark crashes when inspecting HTTP traffic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="libsmi">libsmi-0:0.4.5-3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="wireshark">wireshark-0:0.99.7-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0709">RHSA-2007:0709</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0710">RHSA-2007:0710</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3389
https://nvd.nist.gov/vuln/detail/CVE-2007-3389
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3390">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-05T00:00:00</PublicDate>
    <Bugzilla id="246225" url="https://bugzilla.redhat.com/show_bug.cgi?id=246225" xml:lang="en:us">
Wireshark crashes when inspecting iSeries traffic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Wireshark 0.99.5 and 0.10.x up to 0.10.14, when running on certain systems, allows remote attackers to cause a denial of service (crash) via crafted iSeries capture files that trigger a SIGTRAP.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="libsmi">libsmi-0:0.4.5-3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="wireshark">wireshark-0:0.99.7-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0709">RHSA-2007:0709</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0710">RHSA-2007:0710</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3390
https://nvd.nist.gov/vuln/detail/CVE-2007-3390
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3391">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-03-10T00:00:00</PublicDate>
    <Bugzilla id="245797" url="https://bugzilla.redhat.com/show_bug.cgi?id=245797" xml:lang="en:us">
Wireshark loops infinitely when inspecting DCP ETSI traffic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="libsmi">libsmi-0:0.4.5-3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="wireshark">wireshark-0:0.99.7-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0709">RHSA-2007:0709</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0710">RHSA-2007:0710</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3391
https://nvd.nist.gov/vuln/detail/CVE-2007-3391
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3392">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-17T00:00:00</PublicDate>
    <Bugzilla id="246229" url="https://bugzilla.redhat.com/show_bug.cgi?id=246229" xml:lang="en:us">
Wireshark crashes when inspecting MMS traffic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="libsmi">libsmi-0:0.4.5-3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="wireshark">wireshark-0:0.99.7-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0709">RHSA-2007:0709</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0710">RHSA-2007:0710</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3392
https://nvd.nist.gov/vuln/detail/CVE-2007-3392
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3393">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-05-26T00:00:00</PublicDate>
    <Bugzilla id="246221" url="https://bugzilla.redhat.com/show_bug.cgi?id=246221" xml:lang="en:us">
Wireshark corrupts the stack when inspecting BOOTP traffic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="libsmi">libsmi-0:0.4.5-3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0059">RHSA-2008:0059</Advisory>
        <Package name="wireshark">wireshark-0:0.99.7-EL3.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0709">RHSA-2007:0709</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-EL4.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0710">RHSA-2007:0710</Advisory>
        <Package name="wireshark">wireshark-0:0.99.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3393
https://nvd.nist.gov/vuln/detail/CVE-2007-3393
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3409">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-12-22T00:00:00</PublicDate>
    <Bugzilla id="245804" url="https://bugzilla.redhat.com/show_bug.cgi?id=245804" xml:lang="en:us">
Net:: DNS denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0674">RHSA-2007:0674</Advisory>
        <Package name="perl-Net-DNS">perl-Net-DNS-0:0.31-4.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0674">RHSA-2007:0674</Advisory>
        <Package name="perl-Net-DNS">perl-Net-DNS-0:0.59-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3409
https://nvd.nist.gov/vuln/detail/CVE-2007-3409
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3410">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-06-26T00:00:00</PublicDate>
    <Bugzilla id="245836" url="https://bugzilla.redhat.com/show_bug.cgi?id=245836" xml:lang="en:us">
RealPlayer/HelixPlayer buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="realplayer">realplayer-0:10.0.9-0.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-06-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0605">RHSA-2007:0605</Advisory>
        <Package name="HelixPlayer">HelixPlayer-1:1.0.6-0.EL4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="RealPlayer">RealPlayer-0:10.0.9-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3410
https://nvd.nist.gov/vuln/detail/CVE-2007-3410
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3456">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-07-10T00:00:00</PublicDate>
    <Bugzilla id="247530" url="https://bugzilla.redhat.com/show_bug.cgi?id=247530" xml:lang="en:us">
flash-plugin input validation flaw
    </Bugzilla>
    <CWE>CWE-20</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in Adobe Flash Player 9.0.45.0 and earlier might allow remote attackers to execute arbitrary code via a large length value for a (1) Long string or (2) XML variable type in a crafted (a) FLV or (b) SWF file, related to an &quot;input validation error,&quot; including a signed comparison of values that are assumed to be non-negative.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0696">RHSA-2007:0696</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.48.0-1.el3.with.oss</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0696">RHSA-2007:0696</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.48.0-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0696">RHSA-2007:0696</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.48.0-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3456
https://nvd.nist.gov/vuln/detail/CVE-2007-3456
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3472">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="276751" url="https://bugzilla.redhat.com/show_bug.cgi?id=276751" xml:lang="en:us">
libgd Integer overflow in TrueColor code
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates to libwmf on Red Hat Enterprise Linux 5 and 6. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3472
https://nvd.nist.gov/vuln/detail/CVE-2007-3472
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3473">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="276791" url="https://bugzilla.redhat.com/show_bug.cgi?id=276791" xml:lang="en:us">
libgd NULL pointer dereference when reading a corrupt X bitmap
    </Bugzilla>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
The gdImageCreateXbm function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors involving a gdImageCreate failure.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates to libwmf on Red Hat Enterprise Linux 5 and 6. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3473
https://nvd.nist.gov/vuln/detail/CVE-2007-3473
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3474">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="277091" url="https://bugzilla.redhat.com/show_bug.cgi?id=277091" xml:lang="en:us">
libgd Denial of service and reentrancy fixes in GIF code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the GIF reader in the GD Graphics Library (libgd) before 2.0.35 have unspecified impact and user-assisted remote attack vectors.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of gd as shipped with Red Hat Enterprise Linux 2.1 or 3 as they did not offer GIF image support.

We do not plan to backport a fix for this issue to the gd packages as shipped in Red Hat Enterprise Linux 4 and 5 due to the low likelihood of an application affected by this problem being exposed in a way that would allow a trust boundary to be crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3474
https://nvd.nist.gov/vuln/detail/CVE-2007-3474
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3475">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="277181" url="https://bugzilla.redhat.com/show_bug.cgi?id=277181" xml:lang="en:us">
libgd Denial of service by GIF images without a global color map
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via a GIF image that has no global color map.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3475

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3475
https://nvd.nist.gov/vuln/detail/CVE-2007-3475
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3476">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="277201" url="https://bugzilla.redhat.com/show_bug.cgi?id=277201" xml:lang="en:us">
libgd Denial of service by corrupted GIF images
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3476

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.28-5.4E.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0146">RHSA-2008:0146</Advisory>
        <Package name="gd">gd-0:2.0.33-9.4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3476
https://nvd.nist.gov/vuln/detail/CVE-2007-3476
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3477">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="277221" url="https://bugzilla.redhat.com/show_bug.cgi?id=277221" xml:lang="en:us">
gd: arc drawing functions can consume large amount of CPU time
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
    </Details>
    <Statement xml:lang="en:us">
Due to the minimal impact of this flaw (temporary DoS by high CPU usage) and low likelihood of this problem being exposed in a way that would allow trust boundary crossing, we currently do not plan to backport a fix for this issue to the versions of gd as shipped in Red Hat Enterprise Linux 2.1, 3, 4 or 5.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>libwmf</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3477
https://nvd.nist.gov/vuln/detail/CVE-2007-3477
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3478">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-21T00:00:00</PublicDate>
    <Bugzilla id="277231" url="https://bugzilla.redhat.com/show_bug.cgi?id=277231" xml:lang="en:us">
libgd Certain TTF handling routines are not reentrant
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Race condition in gdImageStringFTEx (gdft_draw_bitmap) in gdft.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving truetype font (TTF) support.
    </Details>
    <Statement xml:lang="en:us">
We currently do not plan to backport a fix for this issue to gd packages in current versions of Red Hat Enterprise Linux 2.1, 3, 4, and 5 due to the low likelihood of and application affected by this problem being exposed in a way that would allow trust boundary to be crossed.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3478
https://nvd.nist.gov/vuln/detail/CVE-2007-3478
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3503">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-28T00:00:00</PublicDate>
    <Bugzilla id="246765" url="https://bugzilla.redhat.com/show_bug.cgi?id=246765" xml:lang="en:us">
HTML files generated with Javadoc are vulnerable to a XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
The Javadoc tool in Sun JDK 6 and JDK 5.0 Update 11 can generate HTML documentation pages that contain cross-site scripting (XSS) vulnerabilities, which allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0818">RHSA-2007:0818</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3503
https://nvd.nist.gov/vuln/detail/CVE-2007-3503
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3506">
    <Bugzilla id="235479" url="https://bugzilla.redhat.com/show_bug.cgi?id=235479" xml:lang="en:us">
CVE-2007-3506 Emboldden rendering  with a sbit font makes glibc detected.
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ft_bitmap_assure_buffer function in src/base/ftbimap.c in FreeType 2.3.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors involving bitmap fonts, related to a &quot;memory buffer overwrite bug.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of freetype as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3506
https://nvd.nist.gov/vuln/detail/CVE-2007-3506
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3508">
    <PublicDate>2007-07-03T00:00:00</PublicDate>
    <Bugzilla id="247208" url="https://bugzilla.redhat.com/show_bug.cgi?id=247208" xml:lang="en:us">
Glibc integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the process_envvars function in elf/rtld.c in glibc before 2.5-rc4 might allow local users to execute arbitrary code via a large LD_HWCAP_MASK environment variable value.  NOTE: the glibc maintainers state that they do not believe that this issue is exploitable for code execution
    </Details>
    <Statement xml:lang="en:us">
After careful analysis by Red Hat and several Glibc developers, it has been determined that this bug is not exploitable.

For more information please see Red Hat Bugzilla bug #247208
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=247208
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3508
https://nvd.nist.gov/vuln/detail/CVE-2007-3508
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3511">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-30T00:00:00</PublicDate>
    <Bugzilla id="1618316" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618316" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the &quot;for&quot; attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.6.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-6.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-5.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3511
https://nvd.nist.gov/vuln/detail/CVE-2007-3511
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3513">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-06-11T00:00:00</PublicDate>
    <Bugzilla id="247728" url="https://bugzilla.redhat.com/show_bug.cgi?id=247728" xml:lang="en:us">
Locally triggerable memory consumption in usblcd
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The lcd_write function in drivers/usb/misc/usblcd.c in the Linux kernel before 2.6.22-rc7 does not limit the amount of memory used by a caller, which allows local users to cause a denial of service (memory consumption).
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3513
https://nvd.nist.gov/vuln/detail/CVE-2007-3513
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3564">
    <Details source="Mitre" xml:lang="en:us">
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  The curl packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5 are not linked against the gnutls library.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3564
https://nvd.nist.gov/vuln/detail/CVE-2007-3564
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3568">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-03T00:00:00</PublicDate>
    <Bugzilla id="426091" url="https://bugzilla.redhat.com/show_bug.cgi?id=426091" xml:lang="en:us">
imlib: infinite loop DoS using crafted BMP image
    </Bugzilla>
    <CWE>CWE-835</CWE>
    <Details source="Mitre" xml:lang="en:us">
The _LoadBMP function in imlib 1.9.15 and earlier allows context-dependent attackers to cause a denial of service (infinite loop) via a BMP image with a Bits Per Page (BPP) value of 0.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider bugs which result in a user-assisted crash of end user application to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3568
https://nvd.nist.gov/vuln/detail/CVE-2007-3568
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3634">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the G/PGP (GPG) Plugin 2.0 for Squirrelmail 1.4.10a allows remote authenticated users to execute arbitrary commands via unspecified vectors, possibly related to the passphrase variable in the gpg_sign_attachment function, aka ZD-00000004.  this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This plugin is not shipped with Squirrelmail in Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3634
https://nvd.nist.gov/vuln/detail/CVE-2007-3634
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3635">
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin before 2.1 for Squirrelmail might allow &quot;local authenticated users&quot; to inject certain commands via unspecified vectors. NOTE: this might overlap CVE-2005-1924, CVE-2006-4169, or CVE-2007-3634.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This plugin is not shipped with Squirrelmail in Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3635
https://nvd.nist.gov/vuln/detail/CVE-2007-3635
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3636">
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the G/PGP (GPG) Plugin 2.1 for Squirrelmail allow remote attackers to execute arbitrary commands via unspecified vectors.  NOTE: this information is based upon a vague pre-advisory from a reliable researcher.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This plugin is not shipped with Squirrelmail in Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3636
https://nvd.nist.gov/vuln/detail/CVE-2007-3636
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3642">
    <Details source="Mitre" xml:lang="en:us">
The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3642
https://nvd.nist.gov/vuln/detail/CVE-2007-3642
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3655">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-10T00:00:00</PublicDate>
    <Bugzilla id="248864" url="https://bugzilla.redhat.com/show_bug.cgi?id=248864" xml:lang="en:us">
A buffer overflow vulnerability in Java Web Start URL parsing code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0818">RHSA-2007:0818</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3655
https://nvd.nist.gov/vuln/detail/CVE-2007-3655
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3656">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-09T00:00:00</PublicDate>
    <Bugzilla id="1618317" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618317" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3656
https://nvd.nist.gov/vuln/detail/CVE-2007-3656
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3698">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-10T00:00:00</PublicDate>
    <Bugzilla id="249539" url="https://bugzilla.redhat.com/show_bug.cgi?id=249539" xml:lang="en:us">
Java Secure Socket Extension Does Not Correctly Process SSL/TLS Handshake Requests Resulting in a Denial of Service (DoS) Condition
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0818">RHSA-2007:0818</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1086">RHSA-2007:1086</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3698
https://nvd.nist.gov/vuln/detail/CVE-2007-3698
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3719">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-13T00:00:00</PublicDate>
    <Bugzilla id="248113" url="https://bugzilla.redhat.com/show_bug.cgi?id=248113" xml:lang="en:us">
kernel: secretly Monopolizing the CPU Without Superuser Privileges
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The process scheduler in the Linux kernel 2.6.16 gives preference to &quot;interactive&quot; processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in &quot;Secretly Monopolizing the CPU Without Superuser Privileges.&quot;
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Security Response Team has rated this issue as having moderate security impact.

The risks associated with fixing this bug are greater than the moderate severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3719
https://nvd.nist.gov/vuln/detail/CVE-2007-3719
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3728">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in lib/silcclient/client_notify.c of SILC Client and SILC Toolkit before 1.1.2 allows remote attackers to cause a denial of service via &quot;NICK_CHANGE&quot; notifications.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  libsilc was not shipped with Enterprise Linux 2.1 or 3.  This issue did not affect the versions of libsilc as shipped with Red Hat Enterprise Linux 4 or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3728
https://nvd.nist.gov/vuln/detail/CVE-2007-3728
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3731">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-15T00:00:00</PublicDate>
    <Bugzilla id="248324" url="https://bugzilla.redhat.com/show_bug.cgi?id=248324" xml:lang="en:us">
NULL pointer dereference triggered by ptrace
    </Bugzilla>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and OOPS) via certain code that makes ptrace PTRACE_SETREGS and PTRACE_SINGLESTEP requests, related to the TRACE_IRQS_ON function, and possibly related to the arch_ptrace function.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3731
https://nvd.nist.gov/vuln/detail/CVE-2007-3731
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3732">
    <ThreatSeverity>Important</ThreatSeverity>
    <Bugzilla id="248353" url="https://bugzilla.redhat.com/show_bug.cgi?id=248353" xml:lang="en:us">
kernel: Reset %fs early in iret_exc
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
In Linux 2.6 before 2.6.23, the TRACE_IRQS_ON function in iret_exc calls a C function without ensuring that the segments are set properly. The kernel's %fs needs to be restored before the call in TRACE_IRQS_ON and before enabling interrupts, so that &quot;current&quot; references work. Without this, &quot;current&quot; used in the window between iret_exc and the middle of error_code where %fs is reset, would crash.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3732
https://nvd.nist.gov/vuln/detail/CVE-2007-3732
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3734">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-07-18T09:00:00</PublicDate>
    <Bugzilla id="1618318" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618318" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3734
https://nvd.nist.gov/vuln/detail/CVE-2007-3734
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3735">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-07-18T09:00:00</PublicDate>
    <Bugzilla id="1618319" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618319" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3735
https://nvd.nist.gov/vuln/detail/CVE-2007-3735
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3736">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-18T09:00:00</PublicDate>
    <Bugzilla id="1618320" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618320" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script &quot;into another site's context&quot; via a &quot;timing issue&quot; involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3736
https://nvd.nist.gov/vuln/detail/CVE-2007-3736
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3737">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-07-18T09:00:00</PublicDate>
    <Bugzilla id="1618321" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618321" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 2.0.0.5 allows remote attackers to execute arbitrary code with chrome privileges by calling an event handler from an unspecified &quot;element outside of a document.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3737
https://nvd.nist.gov/vuln/detail/CVE-2007-3737
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3738">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-07-18T09:00:00</PublicDate>
    <Bugzilla id="1618322" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618322" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.4.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.3.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0722">RHSA-2007:0722</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-4.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0723">RHSA-2007:0723</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-07-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0724">RHSA-2007:0724</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3738
https://nvd.nist.gov/vuln/detail/CVE-2007-3738
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3739">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-31T00:00:00</PublicDate>
    <Bugzilla id="294941" url="https://bugzilla.redhat.com/show_bug.cgi?id=294941" xml:lang="en:us">
LTC36188-Don't allow the stack to grow into hugetlb reserved regions
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1049">RHSA-2007:1049</Advisory>
        <Package name="kernel">kernel-0:2.4.21-53.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3739
https://nvd.nist.gov/vuln/detail/CVE-2007-3739
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3740">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-08T00:00:00</PublicDate>
    <Bugzilla id="275881" url="https://bugzilla.redhat.com/show_bug.cgi?id=275881" xml:lang="en:us">
CIFS should honor umask
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3740
https://nvd.nist.gov/vuln/detail/CVE-2007-3740
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3741">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-09T00:00:00</PublicDate>
    <Bugzilla id="248053" url="https://bugzilla.redhat.com/show_bug.cgi?id=248053" xml:lang="en:us">
Gimp image loader multiple input validation flaws
    </Bugzilla>
    <CWE>CWE-20</CWE>
    <Details source="Mitre" xml:lang="en:us">
The (1) psp (aka .tub), (2) bmp, (3) pcx, and (4) psd plugins in gimp allow user-assisted remote attackers to cause a denial of service (crash or memory consumption) via crafted image files, as discovered using the fusil fuzzing tool.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.1-7.8.el2_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:1.2.3-20.9.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-1:2.0.5-7.0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0513">RHSA-2007:0513</Advisory>
        <Package name="gimp">gimp-2:2.2.13-2.0.7.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3741
https://nvd.nist.gov/vuln/detail/CVE-2007-3741
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3780">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-04T00:00:00</PublicDate>
    <Bugzilla id="254108" url="https://bugzilla.redhat.com/show_bug.cgi?id=254108" xml:lang="en:us">
mysql malformed password crasher
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0875">RHSA-2007:0875</Advisory>
        <Package name="mysql">mysql-0:4.1.20-2.RHEL4.1.0.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0875">RHSA-2007:0875</Advisory>
        <Package name="mysql">mysql-0:5.0.22-2.1.0.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0894">RHSA-2007:0894</Advisory>
        <Package name="mysql">mysql-0:5.0.44-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3780
https://nvd.nist.gov/vuln/detail/CVE-2007-3780
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3781">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-04T00:00:00</PublicDate>
    <Bugzilla id="248553" url="https://bugzilla.redhat.com/show_bug.cgi?id=248553" xml:lang="en:us">
New release of MySQL fixes security bugs
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL Community Server before 5.0.45 does not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement, which allows remote authenticated users to obtain sensitive information such as the table structure.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248553

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0894">RHSA-2007:0894</Advisory>
        <Package name="mysql">mysql-0:5.0.44-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3781
https://nvd.nist.gov/vuln/detail/CVE-2007-3781
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3782">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-04T00:00:00</PublicDate>
    <Bugzilla id="248553" url="https://bugzilla.redhat.com/show_bug.cgi?id=248553" xml:lang="en:us">
New release of MySQL fixes security bugs
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
MySQL Community Server before 5.0.45 allows remote authenticated users to gain update privileges for a table in another database via a view that refers to this external table.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248553

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0364">RHSA-2008:0364</Advisory>
        <Package name="mysql">mysql-0:5.0.45-7.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-09-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0894">RHSA-2007:0894</Advisory>
        <Package name="mysql">mysql-0:5.0.44-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3782
https://nvd.nist.gov/vuln/detail/CVE-2007-3782
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3790">
    <Details source="Mitre" xml:lang="en:us">
The com_print_typeinfo function in the bz2 extension in PHP 5.2.3 allows context-dependent attackers to cause a denial of service via a long argument.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw is specific to PHP on Windows.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3790
https://nvd.nist.gov/vuln/detail/CVE-2007-3790
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3798">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-10T00:00:00</PublicDate>
    <Bugzilla id="250275" url="https://bugzilla.redhat.com/show_bug.cgi?id=250275" xml:lang="en:us">
tcpdump BGP integer overflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
    </Details>
    <Statement xml:lang="en:us">
This issue does not affect the version of tcpdump shipped in Red Hat Enterprise Linux 2.1 or 3.

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250275

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0387">RHSA-2007:0387</Advisory>
        <Package name="tcpdump">tcpdump-14:3.8.2-12.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0368">RHSA-2007:0368</Advisory>
        <Package name="tcpdump">tcpdump-14:3.9.4-11.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3798
https://nvd.nist.gov/vuln/detail/CVE-2007-3798
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3799">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-01T00:00:00</PublicDate>
    <Bugzilla id="250726" url="https://bugzilla.redhat.com/show_bug.cgi?id=250726" xml:lang="en:us">
php cross-site cookie insertion
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3799

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0888">RHSA-2007:0888</Advisory>
        <Package name="php">php-0:4.1.2-2.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3799
https://nvd.nist.gov/vuln/detail/CVE-2007-3799
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3806">
    <Bugzilla id="278091" url="https://bugzilla.redhat.com/show_bug.cgi?id=278091" xml:lang="en:us">
php invalid read in glob
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The glob function in PHP 5.2.3 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an invalid value of the flags parameter, probably related to memory corruption or an invalid read on win32 platforms, and possibly related to lack of initialization for a glob structure.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue only affected PHP on Windows platforms.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3806
https://nvd.nist.gov/vuln/detail/CVE-2007-3806
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3820">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-14T00:00:00</PublicDate>
    <Bugzilla id="248537" url="https://bugzilla.redhat.com/show_bug.cgi?id=248537" xml:lang="en:us">
Spoofing of URI possible in Konqueror's address bar
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
konqueror/konq_combo.cc in Konqueror 3.5.7 allows remote attackers to spoof the data: URI scheme in the address bar via a long URI with trailing whitespace, which prevents the beginning of the URI from being displayed.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect Red Hat Enterprise Linux 2.1 or 3. For Red Hat Enterprise Linux 4 and 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248537

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.5.4-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3820
https://nvd.nist.gov/vuln/detail/CVE-2007-3820
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3835">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-07-21T00:00:00</PublicDate>
    <Bugzilla id="1618323" url="https://bugzilla.redhat.com/show_bug.cgi?id=1618323" xml:lang="en:us">
security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in Ex Libris MetaLib 3.13 and 4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to a resource id that can be discovered through a search.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3835
https://nvd.nist.gov/vuln/detail/CVE-2007-3835
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3843">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-06-08T00:00:00</PublicDate>
    <Bugzilla id="275901" url="https://bugzilla.redhat.com/show_bug.cgi?id=275901" xml:lang="en:us">
CIFS signing sec= mount options don't work correctly
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3843
https://nvd.nist.gov/vuln/detail/CVE-2007-3843
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3844">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-31T00:00:00</PublicDate>
    <Bugzilla id="250648" url="https://bugzilla.redhat.com/show_bug.cgi?id=250648" xml:lang="en:us">
about: blank windows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka &quot;Cross Context Scripting.&quot; NOTE: this issue is caused by a CVE-2007-3089 regression.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250648

The Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.6.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-0.5.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-0.7.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0980">RHSA-2007:0980</Advisory>
        <Package name="seamonkey">seamonkey-0:1.0.9-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-0.5.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0979">RHSA-2007:0979</Advisory>
        <Package name="firefox">firefox-0:1.5.0.12-6.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0981">RHSA-2007:0981</Advisory>
        <Package name="thunderbird">thunderbird-0:1.5.0.12-5.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3844
https://nvd.nist.gov/vuln/detail/CVE-2007-3844
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3845">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2008-07-30T00:00:00</PublicDate>
    <Bugzilla id="2169667" url="https://bugzilla.redhat.com/show_bug.cgi?id=2169667" xml:lang="en:us">
Mozilla: Unescaped URIs passed to external programs
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>8.8</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-150</CWE>
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching &quot;a file handling program based on the file extension at the end of the URI,&quot; a variant of CVE-2007-4041.  NOTE: the vendor states that &quot;it is still possible to launch a filetype handler based on extension rather than the registered protocol handler.&quot;
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
The Mozilla Foundation Security Advisory describes this flaw as:

Jesper Johansson pointed out that Mozilla did not percent-encode spaces and double-quotes in URIs handed off to external programs for handling, which can cause the receiving program to mistakenly interpret a single URI as multiple arguments. The danger depends on the arguments supported by the specific receiving program, though at the very least we know Firefox (and Thunderbird) 2.0.0.4 and older could be used to run arbitrary script (see MFSA 2007-23). The vast majority of programs do not have dangerous arguments, though many could still be made to do something unexpected.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of Firefox or Thunderbird as shipped with Red Hat Enterprise Linux.
    </Statement>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>thunderbird</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>thunderbird</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>thunderbird</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>firefox</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>thunderbird</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3845
https://nvd.nist.gov/vuln/detail/CVE-2007-3845
https://www.mozilla.org/en-US/security/advisories/mfsa2007-27/
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3847">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-01T00:00:00</PublicDate>
    <Bugzilla id="250731" url="https://bugzilla.redhat.com/show_bug.cgi?id=250731" xml:lang="en:us">
httpd: out of bounds read
    </Bugzilla>
    <CWE>CWE-125</CWE>
    <Details source="Mitre" xml:lang="en:us">
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0005">RHSA-2008:0005</Advisory>
        <Package name="httpd">httpd-0:2.0.46-70.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0747">RHSA-2007:0747</Advisory>
        <Package name="httpd">httpd-0:2.0.52-38.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0746">RHSA-2007:0746</Advisory>
        <Package name="httpd">httpd-0:2.2.3-11.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0911">RHSA-2007:0911</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3847
https://nvd.nist.gov/vuln/detail/CVE-2007-3847
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3848">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-08-14T00:00:00</PublicDate>
    <Bugzilla id="250972" url="https://bugzilla.redhat.com/show_bug.cgi?id=250972" xml:lang="en:us">
Privilege escalation via PR_SET_PDEATHSIG
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0787">RHSA-2008:0787</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.67</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0001">RHSA-2009:0001</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.74</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1049">RHSA-2007:1049</Advisory>
        <Package name="kernel">kernel-0:2.4.21-53.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3848
https://nvd.nist.gov/vuln/detail/CVE-2007-3848
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3849">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-04T00:00:00</PublicDate>
    <Bugzilla id="236923" url="https://bugzilla.redhat.com/show_bug.cgi?id=236923" xml:lang="en:us">
Rebase aide to 0.13.1
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Red Hat Enterprise Linux (RHEL) 5 ships the rpm for the Advanced Intrusion Detection Environment (AIDE) before 0.13.1 with a database that lacks checksum information, which allows context-dependent attackers to bypass file integrity checks and modify certain files.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0539">RHSA-2007:0539</Advisory>
        <Package name="aide">aide-0:0.13.1-2.0.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3849
https://nvd.nist.gov/vuln/detail/CVE-2007-3849
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3850">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-04-03T00:00:00</PublicDate>
    <Bugzilla id="308811" url="https://bugzilla.redhat.com/show_bug.cgi?id=308811" xml:lang="en:us">
kernel LTC31426-4k page mapping support for userspace in 64k kernels
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The eHCA driver in Linux kernel 2.6 before 2.6.22, when running on PowerPC, does not properly map userspace resources, which allows local users to read portions of physical address space.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3850
https://nvd.nist.gov/vuln/detail/CVE-2007-3850
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3851">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-08-07T00:00:00</PublicDate>
    <Bugzilla id="251185" url="https://bugzilla.redhat.com/show_bug.cgi?id=251185" xml:lang="en:us">
i965 DRM allows insecure packets
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0705">RHSA-2007:0705</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.10.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3851
https://nvd.nist.gov/vuln/detail/CVE-2007-3851
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3852">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-10T00:00:00</PublicDate>
    <Bugzilla id="251200" url="https://bugzilla.redhat.com/show_bug.cgi?id=251200" xml:lang="en:us">
sysstat insecure temporary file usage
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>1.9</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-377</CWE>
    <Details source="Mitre" xml:lang="en:us">
The init script (sysstat.in) in sysstat 5.1.2 up to 7.1.6 creates /tmp/sysstat.run insecurely, which allows local users to execute arbitrary code.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of sysstat as shipped with Red Hat Enterprise Linux 4. This issue has been addressed in Red Hat Enterprise Linux 5 via RHSA-2011:1005 advisory.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2011-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2011:1005">RHSA-2011:1005</Advisory>
        <Package name="sysstat">sysstat-0:7.0.2-11.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3852
https://nvd.nist.gov/vuln/detail/CVE-2007-3852
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3919">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-10-23T00:00:00</PublicDate>
    <Bugzilla id="350421" url="https://bugzilla.redhat.com/show_bug.cgi?id=350421" xml:lang="en:us">
xen xenmon.py / xenbaked insecure temporary file accesss
    </Bugzilla>
    <CWE>CWE-377</CWE>
    <Details source="Mitre" xml:lang="en:us">
(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0194">RHSA-2008:0194</Advisory>
        <Package name="xen">xen-0:3.0.3-41.el5_1.5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3919
https://nvd.nist.gov/vuln/detail/CVE-2007-3919
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3920">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-10-19T00:00:00</PublicDate>
    <Bugzilla id="350271" url="https://bugzilla.redhat.com/show_bug.cgi?id=350271" xml:lang="en:us">
gnome-screensaver loses keyboard grab when running under compiz
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0485">RHSA-2008:0485</Advisory>
        <Package name="compiz">compiz-0:0.0.13-0.37.20060817git.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3920
https://nvd.nist.gov/vuln/detail/CVE-2007-3920
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3922">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-18T00:00:00</PublicDate>
    <Bugzilla id="249533" url="https://bugzilla.redhat.com/show_bug.cgi?id=249533" xml:lang="en:us">
Vulnerability in the Java Runtime Environment May Allow an Untrusted Applet to Circumvent Network Access Restrictions
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet's outbound connections by connecting to certain localhost services running on the machine that loaded the applet.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-06T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0818">RHSA-2007:0818</Advisory>
        <Package name="java-1.5.0-sun">java-1.5.0-sun-0:1.5.0.12-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-JRE">IBMJava2-JRE-1:1.3.1-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-06-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0133">RHSA-2008:0133</Advisory>
        <Package name="IBMJava2-SDK">IBMJava2-SDK-1:1.3.1-17</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3922
https://nvd.nist.gov/vuln/detail/CVE-2007-3922
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3961">
    <PublicDate>2007-07-19T00:00:00</PublicDate>
    <Bugzilla id="251676" url="https://bugzilla.redhat.com/show_bug.cgi?id=251676" xml:lang="en:us">
fsplib off-by-one error
    </Bugzilla>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the fsp_readdir_r function in fsplib.c in fsplib before 0.9 allows remote attackers to cause a denial of service via a directory entry whose length is exactly MAXNAMELEN, which prevents a terminating null byte from being added.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a user assisted client crash such as this to be a security flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3961
https://nvd.nist.gov/vuln/detail/CVE-2007-3961
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3962">
    <PublicDate>2007-07-19T00:00:00</PublicDate>
    <Bugzilla id="251678" url="https://bugzilla.redhat.com/show_bug.cgi?id=251678" xml:lang="en:us">
fsplib multiple buffer overflows
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple stack-based buffer overflows in fsplib.c in fsplib before 0.9 might allow remote attackers to execute arbitrary code via (1) a long filename that is not properly handled by the fsp_readdir_native function when MAXNAMLEN is greater than 255, or (2) a long d_name directory (dirent) field in the fsp_readdir function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. fsplib is part of gftp in Red Hat Enterprise Linux 5, but this issue does not affect Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3962
https://nvd.nist.gov/vuln/detail/CVE-2007-3962
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3996">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="278031" url="https://bugzilla.redhat.com/show_bug.cgi?id=278031" xml:lang="en:us">
php multiple integer overflows in gd
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0888">RHSA-2007:0888</Advisory>
        <Package name="php">php-0:4.1.2-2.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3996
https://nvd.nist.gov/vuln/detail/CVE-2007-3996
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3997">
    <Bugzilla id="278001" url="https://bugzilla.redhat.com/show_bug.cgi?id=278001" xml:lang="en:us">
php safe_mode bypass with MySQL INFILE LOCAL
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3997
https://nvd.nist.gov/vuln/detail/CVE-2007-3997
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3998">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="276081" url="https://bugzilla.redhat.com/show_bug.cgi?id=276081" xml:lang="en:us">
php floating point exception inside wordwrap
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, &quot;&quot;' argument set.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3998
https://nvd.nist.gov/vuln/detail/CVE-2007-3998
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-3999">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-04T19:00:00</PublicDate>
    <Bugzilla id="250973" url="https://bugzilla.redhat.com/show_bug.cgi?id=250973" xml:lang="en:us">
krb5 RPC library buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the svcauth_gss_validate function in lib/rpc/svc_auth_gss.c in the RPCSEC_GSS RPC library (librpcsecgss) in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and some third-party applications that use krb5, allows remote attackers to cause a denial of service (daemon crash) and probably execute arbitrary code via a long string in an RPC message.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0913">RHSA-2007:0913</Advisory>
        <Package name="nfs-utils-lib">nfs-utils-lib-0:1.0.6-8.z1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0858">RHSA-2007:0858</Advisory>
        <Package name="krb5">krb5-0:1.5-29</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0951">RHSA-2007:0951</Advisory>
        <Package name="nfs-utils-lib">nfs-utils-lib-0:1.0.8-7.2.z2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-3999
https://nvd.nist.gov/vuln/detail/CVE-2007-3999
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4000">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-04T19:00:00</PublicDate>
    <Bugzilla id="250976" url="https://bugzilla.redhat.com/show_bug.cgi?id=250976" xml:lang="en:us">
krb5 kadmind uninitialized pointer
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The kadm5_modify_policy_internal function in lib/kadm5/srv/svr_policy.c in the Kerberos administration daemon (kadmind) in MIT Kerberos 5 (krb5) 1.5 through 1.6.2 does not properly check return values when the policy does not exist, which might allow remote authenticated users with the &quot;modify policy&quot; privilege to execute arbitrary code via unspecified vectors that trigger a write to an uninitialized pointer.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0858">RHSA-2007:0858</Advisory>
        <Package name="krb5">krb5-0:1.5-29</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4000
https://nvd.nist.gov/vuln/detail/CVE-2007-4000
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4029">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-26T00:00:00</PublicDate>
    <Bugzilla id="249780" url="https://bugzilla.redhat.com/show_bug.cgi?id=249780" xml:lang="en:us">
Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0912">RHSA-2007:0912</Advisory>
        <Package name="libvorbis">libvorbis-0:1.0rc2-7.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.0-8.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.0-2.el4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.2-3.el5.0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4029
https://nvd.nist.gov/vuln/detail/CVE-2007-4029
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4033">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-26T00:00:00</PublicDate>
    <Bugzilla id="352271" url="https://bugzilla.redhat.com/show_bug.cgi?id=352271" xml:lang="en:us">
t1lib font filename string overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.  NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. Versions of PHP packages as shipped with current Red Hat products are not linked with t1lib.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1031">RHSA-2007:1031</Advisory>
        <Package name="xpdf">xpdf-1:0.92-19.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1030">RHSA-2007:1030</Advisory>
        <Package name="xpdf">xpdf-1:2.02-11.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1027">RHSA-2007:1027</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.0.1.EL4.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1027">RHSA-2007:1027</Advisory>
        <Package name="tetex">tetex-0:3.0-33.2.el5_1.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4033
https://nvd.nist.gov/vuln/detail/CVE-2007-4033
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4038">
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in Mozilla Firefox before 2.0.0.5, when running on systems with Thunderbird 1.5 installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a mailto URI, which are inserted into the command line that is created when invoking Thunderbird.exe, a similar issue to CVE-2007-3670.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of Firefox or Thunderbird as shipped with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4038
https://nvd.nist.gov/vuln/detail/CVE-2007-4038
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4039">
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability involving Mozilla, when certain URIs are registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in an unspecified URI, which are inserted into the command line when invoking the handling process, a similar issue to CVE-2007-3670.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of Firefox or Thunderbird as shipped with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4039
https://nvd.nist.gov/vuln/detail/CVE-2007-4039
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4044">
    <Bugzilla id="253165" url="https://bugzilla.redhat.com/show_bug.cgi?id=253165" xml:lang="en:us">
'c' character missing from shell metacharacter whitelist
    </Bugzilla>
    <Details source="Red Hat" xml:lang="en:us">
No description is available for this CVE.
    </Details>
    <Statement xml:lang="en:us">
The CVE description for this bug is incorrect.   The backported patch for CVE-2007-2447 missed the character c in the shell escaping whitelist of allowed characters, therefore not allowing commands with a c in them to be executed. This is therefore a regression bug and not a security vulnerability.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4044
https://nvd.nist.gov/vuln/detail/CVE-2007-4044
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4045">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-07-20T00:00:00</PublicDate>
    <Bugzilla id="250161" url="https://bugzilla.redhat.com/show_bug.cgi?id=250161" xml:lang="en:us">
Incomplete fix for CVE-2007-0720 CUPS denial of service
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause a denial of service via unspecified vectors related to an incomplete fix for CVE-2007-0720 that introduced a different denial of service problem in SSL negotiation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1023">RHSA-2007:1023</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1022">RHSA-2007:1022</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.20.2.el4_5.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4045
https://nvd.nist.gov/vuln/detail/CVE-2007-4045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4049">
    <Details source="Red Hat" xml:lang="en:us">
No description is available for this CVE.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This is a rediscovery and therefore a duplicate of CVE-2000-1205 which was corrected in upstream Apache httpd 1.3.11.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4049
https://nvd.nist.gov/vuln/detail/CVE-2007-4049
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4065">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-26T00:00:00</PublicDate>
    <Bugzilla id="249780" url="https://bugzilla.redhat.com/show_bug.cgi?id=249780" xml:lang="en:us">
Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0912">RHSA-2007:0912</Advisory>
        <Package name="libvorbis">libvorbis-0:1.0rc2-7.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.0-8.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.0-2.el4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.2-3.el5.0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4065
https://nvd.nist.gov/vuln/detail/CVE-2007-4065
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4066">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-07-26T00:00:00</PublicDate>
    <Bugzilla id="249780" url="https://bugzilla.redhat.com/show_bug.cgi?id=249780" xml:lang="en:us">
Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029)
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0912">RHSA-2007:0912</Advisory>
        <Package name="libvorbis">libvorbis-0:1.0rc2-7.el2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.0-8.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.0-2.el4.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0845">RHSA-2007:0845</Advisory>
        <Package name="libvorbis">libvorbis-1:1.1.2-3.el5.0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4066
https://nvd.nist.gov/vuln/detail/CVE-2007-4066
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4091">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-15T00:00:00</PublicDate>
    <Bugzilla id="252394" url="https://bugzilla.redhat.com/show_bug.cgi?id=252394" xml:lang="en:us">
rsync off by one flaw
    </Bugzilla>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This flaw did not affect Red Hat Enterprise Linux 2.1, 3, or 4 due to the version of rsync.

This flaw does exist in Red Hat Enterprise Linux 5, but due to the nature of the flaw it is not exploitable with any security consequence due to stack-protector.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4091
https://nvd.nist.gov/vuln/detail/CVE-2007-4091
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4129">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-06T00:00:00</PublicDate>
    <Bugzilla id="251774" url="https://bugzilla.redhat.com/show_bug.cgi?id=251774" xml:lang="en:us">
coolkey file and directory permission flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0631">RHSA-2007:0631</Advisory>
        <Package name="coolkey">coolkey-0:1.1.0-5.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4129
https://nvd.nist.gov/vuln/detail/CVE-2007-4129
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4130">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2006-02-01T00:00:00</PublicDate>
    <Bugzilla id="179665" url="https://bugzilla.redhat.com/show_bug.cgi?id=179665" xml:lang="en:us">
panic caused by set_mempolicy with MPOL_BIND
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0055">RHSA-2008:0055</Advisory>
        <Package name="kernel">kernel-0:2.6.9-67.0.4.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4130
https://nvd.nist.gov/vuln/detail/CVE-2007-4130
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4131">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-12T00:00:00</PublicDate>
    <Bugzilla id="251921" url="https://bugzilla.redhat.com/show_bug.cgi?id=251921" xml:lang="en:us">
tar directory traversal vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Dmitry V. Levin for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0860">RHSA-2007:0860</Advisory>
        <Package name="tar">tar-0:1.14-12.5.1.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0860">RHSA-2007:0860</Advisory>
        <Package name="tar">tar-2:1.15.1-23.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4131
https://nvd.nist.gov/vuln/detail/CVE-2007-4131
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4132">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-29T00:00:00</PublicDate>
    <Bugzilla id="253239" url="https://bugzilla.redhat.com/show_bug.cgi?id=253239" xml:lang="en:us">
RHN Satellite xmlrpc flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Red Hat Network Satellite Server 5.0.0 allows remote authenticated users to execute arbitrary code via unknown vectors in a &quot;back-end XMLRPC handler.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2007-08-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0868">RHSA-2007:0868</Advisory>
        <Package name="rhns">rhns-0:5.0.1-10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4132
https://nvd.nist.gov/vuln/detail/CVE-2007-4132
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4133">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2006-10-28T00:00:00</PublicDate>
    <Bugzilla id="253926" url="https://bugzilla.redhat.com/show_bug.cgi?id=253926" xml:lang="en:us">
prio_tree unit kernel panic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE units, which allows local users to cause a denial of service (panic) via unspecified vectors.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4133
https://nvd.nist.gov/vuln/detail/CVE-2007-4133
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4134">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-21T00:00:00</PublicDate>
    <Bugzilla id="253856" url="https://bugzilla.redhat.com/show_bug.cgi?id=253856" xml:lang="en:us">
star directory traversal vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Robert Buchholz for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0873">RHSA-2007:0873</Advisory>
        <Package name="star">star-0:1.5a08-5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0873">RHSA-2007:0873</Advisory>
        <Package name="star">star-0:1.5a25-8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0873">RHSA-2007:0873</Advisory>
        <Package name="star">star-0:1.5a75-2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4134
https://nvd.nist.gov/vuln/detail/CVE-2007-4134
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4135">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-31T00:00:00</PublicDate>
    <Bugzilla id="254040" url="https://bugzilla.redhat.com/show_bug.cgi?id=254040" xml:lang="en:us">
nfs-utils-lib NFSv4 user id mapping flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The NFSv4 ID mapper (nfsidmap) before 0.17 does not properly handle return values from the getpwnam_r function when performing a username lookup, which can cause it to report a file as being owned by &quot;root&quot; instead of &quot;nobody&quot; if the file exists on the server but not on the client.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0951">RHSA-2007:0951</Advisory>
        <Package name="nfs-utils-lib">nfs-utils-lib-0:1.0.8-7.2.z2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4135
https://nvd.nist.gov/vuln/detail/CVE-2007-4135
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4136">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-10-31T00:00:00</PublicDate>
    <Bugzilla id="336101" url="https://bugzilla.redhat.com/show_bug.cgi?id=336101" xml:lang="en:us">
ricci is vulnerable to a connect DoS attack
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>3.3</CVSSBaseScore>
        <CVSSScoringVector>AV:A/AC:L/Au:N/C:P/I:N/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
The ricci daemon in Red Hat Conga 0.10.0 allows remote attackers to cause a denial of service (loss of new connections) by repeatedly sending data or attempting connections.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_cluster:4">
        <ProductName>CLuster Suite for RHEL 4</ProductName>
        <ReleaseDate>2007-11-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0983">RHSA-2007:0983</Advisory>
        <Package name="conga">conga-0:0.11.0-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_cluster:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0640">RHSA-2007:0640</Advisory>
        <Package name="conga">conga-0:0.10.0-6.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4136
https://nvd.nist.gov/vuln/detail/CVE-2007-4136
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4137">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-03T00:00:00</PublicDate>
    <Bugzilla id="269001" url="https://bugzilla.redhat.com/show_bug.cgi?id=269001" xml:lang="en:us">
QT off by one buffer overflow
    </Bugzilla>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:2.3.1-14.EL2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.1.2-17.RHEL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.3.3-13.RHEL4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0883">RHSA-2007:0883</Advisory>
        <Package name="qt">qt-1:3.3.6-23.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4137
https://nvd.nist.gov/vuln/detail/CVE-2007-4137
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4138">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-11T00:00:00</PublicDate>
    <Bugzilla id="286271" url="https://bugzilla.redhat.com/show_bug.cgi?id=286271" xml:lang="en:us">
samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the &quot;winbind nss info&quot; option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Rick King for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1016">RHSA-2007:1016</Advisory>
        <Package name="samba">samba-0:3.0.25b-1.el4_6.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1017">RHSA-2007:1017</Advisory>
        <Package name="samba">samba-0:3.0.25b-1.el5_1.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4138
https://nvd.nist.gov/vuln/detail/CVE-2007-4138
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4139">
    <Bugzilla id="250751" url="https://bugzilla.redhat.com/show_bug.cgi?id=250751" xml:lang="en:us">
WordPress 2.2.1 wp-admin/upload.php XSS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the Temporary Uploads editing functionality (wp-admin/includes/upload.php) in WordPress 2.2.1, allows remote attackers to inject arbitrary web script or HTML via the style parameter to wp-admin/upload.php.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4139
https://nvd.nist.gov/vuln/detail/CVE-2007-4139
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4211">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-01T00:00:00</PublicDate>
    <Bugzilla id="251007" url="https://bugzilla.redhat.com/show_bug.cgi?id=251007" xml:lang="en:us">
Dovecot possible privilege ascalation in ACL plugin
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
    </Details>
    <Statement xml:lang="en:us">
These issues did not affect the dovecot versions as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0297">RHSA-2008:0297</Advisory>
        <Package name="dovecot">dovecot-0:1.0.7-2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4211
https://nvd.nist.gov/vuln/detail/CVE-2007-4211
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4224">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-07T00:00:00</PublicDate>
    <Bugzilla id="251708" url="https://bugzilla.redhat.com/show_bug.cgi?id=251708" xml:lang="en:us">
URL spoof in address bar
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.3.1-9.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.5.4-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0909">RHSA-2007:0909</Advisory>
        <Package name="kdelibs">kdelibs-6:3.5.4-13.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4224
https://nvd.nist.gov/vuln/detail/CVE-2007-4224
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4225">
    <Details source="Mitre" xml:lang="en:us">
Visual truncation vulnerability in KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar via an http URI with a large amount of whitespace in the user/password portion.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  Not vulnerable. These issues did not affect the versions of konqueror as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4225
https://nvd.nist.gov/vuln/detail/CVE-2007-4225
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4229">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in KDE Konqueror 3.5.7 and earlier allows remote attackers to cause a denial of service (failed assertion and application crash) via certain malformed HTML, as demonstrated by a document containing TEXTAREA, BUTTON, BR, BDO, PRE, FRAMESET, and A tags.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider a crash of a client application such as Konqueror to be a security flaw.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4229
https://nvd.nist.gov/vuln/detail/CVE-2007-4229
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4251">
    <Bugzilla id="251717" url="https://bugzilla.redhat.com/show_bug.cgi?id=251717" xml:lang="en:us">
OpenOffice crashes upon opening certain files
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
OpenOffice.org (OOo) 2.2 does not properly handle files with multiple extensions, which allows user-assisted remote attackers to cause a denial of service.
    </Details>
    <Statement xml:lang="en:us">
Red Hat does not consider this flaw a security issue. This flaw will only crash OpenOffice.org if a victim opens a malicious document.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4251
https://nvd.nist.gov/vuln/detail/CVE-2007-4251
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4255">
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the mSQL extension in PHP 5.2.3 allows context-dependent attackers to execute arbitrary code via a long first argument to the msql_connect function.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  PHP packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4, and 5 are not compiled with msql library and are not vulnerable to this issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4255
https://nvd.nist.gov/vuln/detail/CVE-2007-4255
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4308">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-07-23T00:00:00</PublicDate>
    <Bugzilla id="252309" url="https://bugzilla.redhat.com/show_bug.cgi?id=252309" xml:lang="en:us">
kernel: Missing ioctl() permission checks in aacraid driver
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0787">RHSA-2008:0787</Advisory>
        <Package name="kernel">kernel-0:2.4.18-e.67</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2009-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:0001">RHSA-2009:0001</Advisory>
        <Package name="kernel">kernel-0:2.4.9-e.74</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1049">RHSA-2007:1049</Advisory>
        <Package name="kernel">kernel-0:2.4.21-53.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4308
https://nvd.nist.gov/vuln/detail/CVE-2007-4308
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4324">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-09T00:00:00</PublicDate>
    <Bugzilla id="252292" url="https://bugzilla.redhat.com/show_bug.cgi?id=252292" xml:lang="en:us">
Flash movie can determine whether a TCP port is open
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.  NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el3.with.oss</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0980">RHSA-2008:0980</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.151.0-1.el3.with.oss</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2008-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0980">RHSA-2008:0980</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.151.0-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-10-28T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0945">RHSA-2008:0945</Advisory>
        <Package name="flash-plugin">flash-plugin-0:10.0.12.36-2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4324
https://nvd.nist.gov/vuln/detail/CVE-2007-4324
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4351">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-31T00:00:00</PublicDate>
    <Bugzilla id="345091" url="https://bugzilla.redhat.com/show_bug.cgi?id=345091" xml:lang="en:us">
cups boundary error
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Vulnerable. This issue affected the CUPS packages in Red Hat Enterprise Linux 5.

This issue also affected the versions of CUPS packages in Red Hat Enterprise Linux 3 and 4, but exploitation would only lead to a possible denial of service.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Alin Rad Pop for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1023">RHSA-2007:1023</Advisory>
        <Package name="cups">cups-1:1.1.17-13.3.46</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1022">RHSA-2007:1022</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.20.2.el4_5.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-31T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1020">RHSA-2007:1020</Advisory>
        <Package name="cups">cups-1:1.2.4-11.14.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4351
https://nvd.nist.gov/vuln/detail/CVE-2007-4351
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4352">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="345101" url="https://bugzilla.redhat.com/show_bug.cgi?id=345101" xml:lang="en:us">
DCTStream:: readProgressiveDataUnit()
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1030">RHSA-2007:1030</Advisory>
        <Package name="xpdf">xpdf-1:2.02-11.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1022">RHSA-2007:1022</Advisory>
        <Package name="cups">cups-1:1.1.22-0.rc1.9.20.2.el4_5.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1024">RHSA-2007:1024</Advisory>
        <Package name="kdegraphics">kdegraphics-7:3.3.1-6.el4_5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1025">RHSA-2007:1025</Advisory>
        <Package name="gpdf">gpdf-0:2.8.2-7.7.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1027">RHSA-2007:1027</Advisory>
        <Package name="tetex">tetex-0:2.0.2-22.0.1.EL4.10</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1029">RHSA-2007:1029</Advisory>
        <Package name="xpdf">xpdf-1:3.00-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1021">RHSA-2007:1021</Advisory>
        <Package name="cups">cups-1:1.2.4-11.14.el5_1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1026">RHSA-2007:1026</Advisory>
        <Package name="poppler">poppler-0:0.5.4-4.3.el5_1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1027">RHSA-2007:1027</Advisory>
        <Package name="tetex">tetex-0:3.0-33.2.el5_1.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4352
https://nvd.nist.gov/vuln/detail/CVE-2007-4352
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4381">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-08-15T00:00:00</PublicDate>
    <Bugzilla id="253488" url="https://bugzilla.redhat.com/show_bug.cgi?id=253488" xml:lang="en:us">
java: Vulnerability in the font parsing code
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1086">RHSA-2007:1086</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.15-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0829">RHSA-2007:0829</Advisory>
        <Package name="java-1.5.0-ibm">java-1.5.0-ibm-1:1.5.0.5-1jpp.0.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0956">RHSA-2007:0956</Advisory>
        <Package name="java-1.5.0-bea">java-1.5.0-bea-0:1.5.0.11-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-03-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0100">RHSA-2008:0100</Advisory>
        <Package name="java-1.4.2-bea">java-1.4.2-bea-0:1.4.2.16-1jpp.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0132">RHSA-2008:0132</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4381
https://nvd.nist.gov/vuln/detail/CVE-2007-4381
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4400">
    <ThreatSeverity>Low</ThreatSeverity>
    <Bugzilla id="253545" url="https://bugzilla.redhat.com/show_bug.cgi?id=253545" xml:lang="en:us">
konversation: Command injection in media script via crafted song tag
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
CRLF injection vulnerability in the included media script in Konversation allows user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4400
https://nvd.nist.gov/vuln/detail/CVE-2007-4400
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4465">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-13T00:00:00</PublicDate>
    <Bugzilla id="289511" url="https://bugzilla.redhat.com/show_bug.cgi?id=289511" xml:lang="en:us">
mod_autoindex XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
    </Details>
    <Statement xml:lang="en:us">
This is actually a flaw in browsers that do not derive the response character set as required by RFC 2616. This does not affect the default configuration of Apache httpd in Red Hat products and will only affect customers who have removed the &quot;AddDefaultCharset&quot; directive and are using directory indexes. The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0004">RHSA-2008:0004</Advisory>
        <Package name="apache">apache-0:1.3.27-14.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0005">RHSA-2008:0005</Advisory>
        <Package name="httpd">httpd-0:2.0.46-70.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0006">RHSA-2008:0006</Advisory>
        <Package name="httpd">httpd-0:2.0.52-38.ent.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0008">RHSA-2008:0008</Advisory>
        <Package name="httpd">httpd-0:2.2.3-11.el5_1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0911">RHSA-2007:0911</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4465
https://nvd.nist.gov/vuln/detail/CVE-2007-4465
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4476">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-17T00:00:00</PublicDate>
    <Bugzilla id="280961" url="https://bugzilla.redhat.com/show_bug.cgi?id=280961" xml:lang="en:us">
tar/cpio stack crashing in safer_name_suffix
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a &quot;crashing stack.&quot;
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the version of cpio as shipped with Red Hat Enterprise Linux 3 and 4.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2010-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0141">RHSA-2010:0141</Advisory>
        <Package name="tar">tar-0:1.14-13.el4_8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-03-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0141">RHSA-2010:0141</Advisory>
        <Package name="tar">tar-2:1.15.1-23.0.1.el5_4.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-03-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0144">RHSA-2010:0144</Advisory>
        <Package name="cpio">cpio-0:2.6-23.el5_4.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4476
https://nvd.nist.gov/vuln/detail/CVE-2007-4476
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4507">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in the php_ntuser component for PHP 5.2.3 allow context-dependent attackers to cause a denial of service or execute arbitrary code via long arguments to the (1) ntuser_getuserlist, (2) ntuser_getuserinfo, (3) ntuser_getusergroups, or (4) ntuser_getdomaincontroller functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of php as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5, or Red Hat Application Stack 1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4507
https://nvd.nist.gov/vuln/detail/CVE-2007-4507
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4559">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-24T00:00:00</PublicDate>
    <Bugzilla id="263261" url="https://bugzilla.redhat.com/show_bug.cgi?id=263261" xml:lang="en:us">
python: tarfile module directory traversal
    </Bugzilla>
    <CVSS3 status="verified">
        <CVSS3BaseScore>5.5</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-22</CWE>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
    </Details>
    <Details source="Red Hat" xml:lang="en:us">
A flaw was found in the Python tarfile module. Extracting a crafted TAR archive with the tarfile.extract or tarfile.extractall functions could lead to a directory traversal vulnerability, resulting in overwrite of arbitrary files.
    </Details>
    <Statement xml:lang="en:us">
The Red Hat Product Security has rated this issue as having a Moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification.

Versions of `python36:3.6/python36` as shipped with Red Hat Enterprise Linux 8 are marked as 'Not affected' as they just provide &quot;symlinks&quot; to the main `python3` component, which provides the actual interpreter of the Python programming language.
    </Statement>
    <Mitigation xml:lang="en:us">
Do not extract archives from untrusted sources with the Python tarfile module. Users of the module should add sanity checks when calling the tarfile.extract or tarfile.extractall functions.
    </Mitigation>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6914">RHSA-2023:6914</Advisory>
        <Package name="python3.11-pip">python3.11-pip-0:22.3.1-4.el8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7024">RHSA-2023:7024</Advisory>
        <Package name="python3.11">python3.11-0:3.11.5-1.el8_9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7034">RHSA-2023:7034</Advisory>
        <Package name="python39:3.9">python39:3.9-8090020230922213827.7484f1d1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7034">RHSA-2023:7034</Advisory>
        <Package name="python39-devel:3.9">python39-devel:3.9-8090020230922213827.7484f1d1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7050">RHSA-2023:7050</Advisory>
        <Package name="python38:3.8">python38:3.8-8090020230810143931.d9f72c26</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7050">RHSA-2023:7050</Advisory>
        <Package name="python38-devel:3.8">python38-devel:3.8-8090020230810143931.d9f72c26</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7151">RHSA-2023:7151</Advisory>
        <Package name="python3">python3-0:3.6.8-56.el8_9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7176">RHSA-2023:7176</Advisory>
        <Package name="python-pip">python-pip-0:9.0.3-23.el8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7151">RHSA-2023:7151</Advisory>
        <Package name="python3">python3-0:3.6.8-56.el8_9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <ReleaseDate>2023-11-14T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:7176">RHSA-2023:7176</Advisory>
        <Package name="python-pip">python-pip-0:9.0.3-23.el8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_eus:8.6">
        <ProductName>Red Hat Enterprise Linux 8.6 Extended Update Support</ProductName>
        <ReleaseDate>2024-01-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2024:0374">RHSA-2024:0374</Advisory>
        <Package name="python-pip">python-pip-0:9.0.3-22.1.el8_6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_eus:8.6">
        <ProductName>Red Hat Enterprise Linux 8.6 Extended Update Support</ProductName>
        <ReleaseDate>2024-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2024:0430">RHSA-2024:0430</Advisory>
        <Package name="python3">python3-0:3.6.8-47.el8_6.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_eus:8.8">
        <ProductName>Red Hat Enterprise Linux 8.8 Extended Update Support</ProductName>
        <ReleaseDate>2024-01-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2024:0587">RHSA-2024:0587</Advisory>
        <Package name="python-pip">python-pip-0:9.0.3-22.1.el8_8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6324">RHSA-2023:6324</Advisory>
        <Package name="python3.11-pip">python3.11-pip-0:22.3.1-4.el9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6494">RHSA-2023:6494</Advisory>
        <Package name="python3.11">python3.11-0:3.11.5-1.el9_3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6659">RHSA-2023:6659</Advisory>
        <Package name="python3.9">python3.9-0:3.9.18-1.el9_3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6694">RHSA-2023:6694</Advisory>
        <Package name="python-pip">python-pip-0:21.2.3-7.el9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6659">RHSA-2023:6659</Advisory>
        <Package name="python3.9">python3.9-0:3.9.18-1.el9_3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:9">
        <ProductName>Red Hat Enterprise Linux 9</ProductName>
        <ReleaseDate>2023-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6694">RHSA-2023:6694</Advisory>
        <Package name="python-pip">python-pip-0:21.2.3-7.el9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_software_collections:3::el7">
        <ProductName>Red Hat Software Collections for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2023-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6793">RHSA-2023:6793</Advisory>
        <Package name="rh-python38-python">rh-python38-python-0:3.8.18-2.el7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_software_collections:3::el7">
        <ProductName>Red Hat Software Collections for Red Hat Enterprise Linux 7</ProductName>
        <ReleaseDate>2023-11-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2023:6793">RHSA-2023:6793</Advisory>
        <Package name="rh-python38-python-pip">rh-python38-python-pip-0:19.3.1-4.el7</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>python</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>python</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Out of support scope</FixState>
        <PackageName>python3</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>python27:2.7/python2</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>python36:3.6/python36</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4559
https://nvd.nist.gov/vuln/detail/CVE-2007-4559
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4565">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-28T00:00:00</PublicDate>
    <Bugzilla id="260601" url="https://bugzilla.redhat.com/show_bug.cgi?id=260601" xml:lang="en:us">
Fetchmail NULL pointer dereference
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>2.6</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-476</CWE>
    <Details source="Mitre" xml:lang="en:us">
sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2009-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1427">RHSA-2009:1427</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.0-3.el3.5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2009-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1427">RHSA-2009:1427</Advisory>
        <Package name="fetchmail">fetchmail-0:6.2.5-6.0.1.el4_8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-09-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1427">RHSA-2009:1427</Advisory>
        <Package name="fetchmail">fetchmail-0:6.3.6-1.1.el5_3.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4565
https://nvd.nist.gov/vuln/detail/CVE-2007-4565
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4567">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-07T00:00:00</PublicDate>
    <Bugzilla id="548641" url="https://bugzilla.redhat.com/show_bug.cgi?id=548641" xml:lang="en:us">
kernel: ipv6_hop_jumbo remote system crash
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>7.8</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:L/Au:N/C:N/I:N/A:C</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-228-&gt;CWE-119</CWE>
    <Details source="Mitre" xml:lang="en:us">
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.

This upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-01-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0019">RHSA-2010:0019</Advisory>
        <Package name="kernel">kernel-0:2.6.18-164.10.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:rhel_eus:5.2">
        <ProductName>Red Hat Enterprise Linux 5.2 Z Stream</ProductName>
        <ReleaseDate>2010-02-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0079">RHSA-2010:0079</Advisory>
        <Package name="kernel">kernel-0:2.6.18-92.1.35.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:rhel_eus:5.3">
        <ProductName>Red Hat Enterprise Linux 5.3.Z - Server Only</ProductName>
        <ReleaseDate>2010-01-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0053">RHSA-2010:0053</Advisory>
        <Package name="kernel">kernel-0:2.6.18-128.12.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5::hypervisor">
        <ProductName>Red Hat Enterprise Virtualization for RHEL-5</ProductName>
        <ReleaseDate>2010-02-09T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0095">RHSA-2010:0095</Advisory>
        <Package name="rhev-hypervisor">rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4567
https://nvd.nist.gov/vuln/detail/CVE-2007-4567
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4568">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-10-02T00:00:00</PublicDate>
    <Bugzilla id="281921" url="https://bugzilla.redhat.com/show_bug.cgi?id=281921" xml:lang="en:us">
xfs integer overflow in the build_range function
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in the build_range function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values, which triggers a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0029">RHSA-2008:0029</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-86.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0029">RHSA-2008:0029</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-126.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0030">RHSA-2008:0030</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.33.0.2</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>xorg-x11-xfs</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4568
https://nvd.nist.gov/vuln/detail/CVE-2007-4568
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4569">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="287311" url="https://bugzilla.redhat.com/show_bug.cgi?id=287311" xml:lang="en:us">
kdm password-less login vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and &quot;shutdown with password&quot; is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.3.1-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0905">RHSA-2007:0905</Advisory>
        <Package name="kdebase">kdebase-6:3.5.4-15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4569
https://nvd.nist.gov/vuln/detail/CVE-2007-4569
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4570">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-11-07T00:00:00</PublicDate>
    <Bugzilla id="288201" url="https://bugzilla.redhat.com/show_bug.cgi?id=288201" xml:lang="en:us">
mctransd DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Algorithmic complexity vulnerability in the MCS translation daemon in mcstrans 0.2.3 allows local users to cause a denial of service (temporary daemon outage) via a large range of compartments in sensitivity labels.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0542">RHSA-2007:0542</Advisory>
        <Package name="mcstrans">mcstrans-0:0.2.6-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4570
https://nvd.nist.gov/vuln/detail/CVE-2007-4570
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4571">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-25T00:00:00</PublicDate>
    <Bugzilla id="288961" url="https://bugzilla.redhat.com/show_bug.cgi?id=288961" xml:lang="en:us">
ALSA memory disclosure flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Neil Kettle and iDefense for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0939">RHSA-2007:0939</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.12.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0993">RHSA-2007:0993</Advisory>
        <Package name="kernel">kernel-0:2.6.18-53.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4571
https://nvd.nist.gov/vuln/detail/CVE-2007-4571
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4572">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-11-15T14:00:00</PublicDate>
    <Bugzilla id="294631" url="https://bugzilla.redhat.com/show_bug.cgi?id=294631" xml:lang="en:us">
samba buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Samba developers for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1013">RHSA-2007:1013</Advisory>
        <Package name="samba">samba-0:2.2.12-1.21as.8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1013">RHSA-2007:1013</Advisory>
        <Package name="samba">samba-0:3.0.9-1.3E.14.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1016">RHSA-2007:1016</Advisory>
        <Package name="samba">samba-0:3.0.25b-1.el4_6.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1017">RHSA-2007:1017</Advisory>
        <Package name="samba">samba-0:3.0.25b-1.el5_1.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4572
https://nvd.nist.gov/vuln/detail/CVE-2007-4572
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4573">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-21T00:00:00</PublicDate>
    <Bugzilla id="294541" url="https://bugzilla.redhat.com/show_bug.cgi?id=294541" xml:lang="en:us">
x86_64 syscall vulnerability
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
    </Details>
    <Statement xml:lang="en:us">
This issue affected users who were running 64-bit versions of Red Hat Enterprise Linux 3, 4, or 5 on x86_64 architecture. It did not affect users of Red Hat Enterprise Linux 2.1.
    </Statement>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Wojciech Purczynski for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0938">RHSA-2007:0938</Advisory>
        <Package name="kernel">kernel-0:2.4.21-52.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0937">RHSA-2007:0937</Advisory>
        <Package name="kernel">kernel-0:2.6.9-55.0.9.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0936">RHSA-2007:0936</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.14.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4573
https://nvd.nist.gov/vuln/detail/CVE-2007-4573
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4574">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-22T00:00:00</PublicDate>
    <Bugzilla id="298141" url="https://bugzilla.redhat.com/show_bug.cgi?id=298141" xml:lang="en:us">
EM64T local DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the &quot;stack unwinder fixes&quot; in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0940">RHSA-2007:0940</Advisory>
        <Package name="kernel">kernel-0:2.6.18-8.1.15.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4574
https://nvd.nist.gov/vuln/detail/CVE-2007-4574
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4575">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-12-04T00:00:00</PublicDate>
    <Bugzilla id="299801" url="https://bugzilla.redhat.com/show_bug.cgi?id=299801" xml:lang="en:us">
OpenOffice.org-base allows Denial-of-Service and command injection
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
HSQLDB before 1.8.0.9, as used in OpenOffice.org (OOo) 2 before 2.3.1, allows user-assisted remote attackers to execute arbitrary Java code via crafted database documents, related to &quot;exposing static java methods.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="glassfish-javamail">glassfish-javamail-0:1.4.0-0jpp.ep1.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="hibernate3">hibernate3-1:3.2.4-1.SP1_CP02.0jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="hibernate3-annotations">hibernate3-annotations-0:3.2.1-1.patch02.1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="hibernate3-entitymanager">hibernate3-entitymanager-0:3.2.1-1jpp.ep1.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="hsqldb">hsqldb-1:1.8.0.8-2.patch01.1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jacorb">jacorb-0:2.3.0-1jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jboss-aop">jboss-aop-0:1.5.5-1.CP01.0jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jbossas">jbossas-0:4.2.0-3.GA_CP02.ep1.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jboss-cache">jboss-cache-0:1.4.1-4.SP8_CP01.1jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jboss-remoting">jboss-remoting-0:2.2.2-3.SP4.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jboss-seam">jboss-seam-0:1.2.1-1.ep1.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jbossweb">jbossweb-0:2.0.0-3.CP05.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jbossws-jboss42">jbossws-jboss42-0:1.2.1-0jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jcommon">jcommon-0:1.0.12-1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jfreechart">jfreechart-0:1.0.9-1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="jgroups">jgroups-1:2.4.1-1.SP4.0jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4">
        <ProductName>JBEAP 4.2.0 for RHEL 4</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0151">RHSA-2008:0151</Advisory>
        <Package name="rh-eap-docs">rh-eap-docs-0:4.2.0-3.GA_CP02.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="hibernate3">hibernate3-0:3.2.4-1.SP1_CP02.0jpp.ep1.1.el5.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="hibernate3-annotations">hibernate3-annotations-0:3.2.1-1.patch02.1jpp.ep1.2.el5.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jacorb">jacorb-0:2.3.0-1jpp.ep1.5.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jboss-aop">jboss-aop-0:1.5.5-1.CP01.0jpp.ep1.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jbossas">jbossas-0:4.2.0-4.GA_CP02.ep1.3.el5.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jboss-cache">jboss-cache-0:1.4.1-4.SP8_CP01.1jpp.ep1.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jboss-remoting">jboss-remoting-0:2.2.2-3.SP4.0jpp.ep1.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jboss-seam">jboss-seam-0:1.2.1-1.ep1.3.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jbossweb">jbossweb-0:2.0.0-3.CP05.0jpp.ep1.1.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jcommon">jcommon-0:1.0.12-1jpp.ep1.2.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="jfreechart">jfreechart-0:1.0.9-1jpp.ep1.2.el5.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5">
        <ProductName>JBEAP 4.2.0 for RHEL 5</ProductName>
        <ReleaseDate>2008-04-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0213">RHSA-2008:0213</Advisory>
        <Package name="rh-eap-docs">rh-eap-docs-0:4.2.0-3.GA_CP02.ep1.1.el5.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1090">RHSA-2007:1090</Advisory>
        <Package name="openoffice.org2">openoffice.org2-1:2.0.4-5.7.0.3.0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1048">RHSA-2007:1048</Advisory>
        <Package name="hsqldb">hsqldb-1:1.8.0.4-3jpp.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1048">RHSA-2007:1048</Advisory>
        <Package name="openoffice.org">openoffice.org-1:2.0.4-5.4.25</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="concurrent">concurrent-0:1.3.4-7jpp.ep1.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="glassfish-jaf">glassfish-jaf-0:1.1.0-0jpp.ep1.10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="glassfish-javamail">glassfish-javamail-0:1.4.0-0jpp.ep1.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="glassfish-jsf">glassfish-jsf-0:1.2_04-1.p02.0jpp.ep1.18</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="glassfish-jstl">glassfish-jstl-0:1.2.0-0jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="hibernate3">hibernate3-1:3.2.4-1.SP1_CP02.0jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="hibernate3-annotations">hibernate3-annotations-0:3.2.1-1.patch02.1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="hibernate3-entitymanager">hibernate3-entitymanager-0:3.2.1-1jpp.ep1.6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="hsqldb">hsqldb-1:1.8.0.8-2.patch01.1jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jacorb">jacorb-0:2.3.0-1jpp.ep1.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jboss-aop">jboss-aop-0:1.5.5-1.CP01.0jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jbossas">jbossas-0:4.2.0-3.GA_CP02.ep1.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jboss-cache">jboss-cache-0:1.4.1-4.SP8_CP01.1jpp.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jboss-common">jboss-common-0:1.2.1-0jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jboss-remoting">jboss-remoting-0:2.2.2-3.SP4.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jboss-seam">jboss-seam-0:1.2.1-1.ep1.3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jbossweb">jbossweb-0:2.0.0-3.CP05.0jpp.ep1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jbossws-wsconsume-impl">jbossws-wsconsume-impl-0:2.0.0-0jpp.ep1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jbossxb">jbossxb-0:1.0.0-2.SP1.0jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jcommon">jcommon-0:1.0.12-1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jfreechart">jfreechart-0:1.0.9-1jpp.ep1.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="jgroups">jgroups-1:2.4.1-1.SP4.0jpp.ep1.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="rh-eap-docs">rh-eap-docs-0:4.2.0-3.GA_CP02.ep1.1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-03-24T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0158">RHSA-2008:0158</Advisory>
        <Package name="wsdl4j">wsdl4j-0:1.6.2-1jpp.ep1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4575
https://nvd.nist.gov/vuln/detail/CVE-2007-4575
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4584">
    <Bugzilla id="303311" url="https://bugzilla.redhat.com/show_bug.cgi?id=303311" xml:lang="en:us">
Buffer overflow in IrcII by long MODE from server
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in BitchX 1.1 Final allows remote IRC servers to execute arbitrary code via a long string in a MODE command, related to the p_mode variable.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the version of IrcII as shipped with Red Hat Enterprise Linux 2.1. IrcII was not shipped in Enterprise Linux 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4584
https://nvd.nist.gov/vuln/detail/CVE-2007-4584
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4586">
    <Details source="Mitre" xml:lang="en:us">
Multiple buffer overflows in php_iisfunc.dll in the iisfunc extension for PHP 5.2.0 and earlier allow context-dependent attackers to execute arbitrary code, probably during Unicode conversion, as demonstrated by a long string in the first argument to the iis_getservicestate function, related to the ServiceId argument to the (1) fnStartService, (2) fnGetServiceState, (3) fnStopService, and possibly other functions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue does not affect the versions of PHP shipped
with Red Hat Enterprise Linux. It only affects the PHP version for Windows.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4586
https://nvd.nist.gov/vuln/detail/CVE-2007-4586
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4599">
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in RealNetworks RealPlayer 10 and possibly 10.5, and RealOne Player 1 and 2, for Windows allows remote attackers to execute arbitrary code via a crafted playlist (PLS) file.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of RealPlayer as shipped with Red Hat Enterprise Linux 3 Extras, 4 Extras, or 5 Supplementary.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4599
https://nvd.nist.gov/vuln/detail/CVE-2007-4599
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4601">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-02-02T00:00:00</PublicDate>
    <Bugzilla id="271941" url="https://bugzilla.redhat.com/show_bug.cgi?id=271941" xml:lang="en:us">
libwrap ignores rules under certain circumstances
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue was specific to a patch from Debian project and did not affect versions of tcp_wrappers packages as shipped with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4601
https://nvd.nist.gov/vuln/detail/CVE-2007-4601
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4619">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-11T00:00:00</PublicDate>
    <Bugzilla id="331991" url="https://bugzilla.redhat.com/show_bug.cgi?id=331991" xml:lang="en:us">
FLAC Integer overflows
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0975">RHSA-2007:0975</Advisory>
        <Package name="flac">flac-0:1.1.0-7.el4_5.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0975">RHSA-2007:0975</Advisory>
        <Package name="flac">flac-0:1.1.2-28.el5_0.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4619
https://nvd.nist.gov/vuln/detail/CVE-2007-4619
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4639">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-29T00:00:00</PublicDate>
    <Bugzilla id="284521" url="https://bugzilla.redhat.com/show_bug.cgi?id=284521" xml:lang="en:us">
EnterpriseDB security flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
EnterpriseDB Advanced Server 8.2 does not properly handle certain debugging function calls that occur before a call to pldbg_create_listener, which allows remote authenticated users to cause a denial of service (daemon crash) and possibly execute arbitrary code via a SELECT statement that invokes a pldbg_ function, as demonstrated by (1) pldbg_get_stack and (2) pldbg_abort_target, which triggers use of an uninitialized pointer.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4639
https://nvd.nist.gov/vuln/detail/CVE-2007-4639
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4652">
    <Bugzilla id="277971" url="https://bugzilla.redhat.com/show_bug.cgi?id=277971" xml:lang="en:us">
php open_basedir bypass in session extension with symlink
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The session extension in PHP before 5.2.4 might allow local users to bypass open_basedir restrictions via a session file that is a symlink.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4652
https://nvd.nist.gov/vuln/detail/CVE-2007-4652
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4657">
    <Bugzilla id="278061" url="https://bugzilla.redhat.com/show_bug.cgi?id=278061" xml:lang="en:us">
php integer overflow in strspn/strcspn
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to obtain sensitive information (memory contents) or cause a denial of service (thread crash) via a large len value to the (1) strspn or (2) strcspn function, which triggers an out-of-bounds read.  NOTE: this affects different product versions than CVE-2007-3996.
    </Details>
    <Statement xml:lang="en:us">
The only effect of this bug is to cause the process to read from a random segment of memory, if a large &quot;length&quot; parameter is passed to the strspn/strcspn function, which is under the control of the script author. This bug has no security impact.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4657
https://nvd.nist.gov/vuln/detail/CVE-2007-4657
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4658">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="278011" url="https://bugzilla.redhat.com/show_bug.cgi?id=278011" xml:lang="en:us">
php money_format format string issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4658
https://nvd.nist.gov/vuln/detail/CVE-2007-4658
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4659">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="276531" url="https://bugzilla.redhat.com/show_bug.cgi?id=276531" xml:lang="en:us">
php zend_alter_ini_entry() memory_limit interruption
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The zend_alter_ini_entry function in PHP before 5.2.4 does not properly handle an interruption to the flow of execution triggered by a memory_limit violation, which has unknown impact and attack vectors.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5 or Red Hat Application Stack v1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4659
https://nvd.nist.gov/vuln/detail/CVE-2007-4659
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4660">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="278161" url="https://bugzilla.redhat.com/show_bug.cgi?id=278161" xml:lang="en:us">
php size calculation in chunk_split
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in the chunk_split function in PHP before 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4660
https://nvd.nist.gov/vuln/detail/CVE-2007-4660
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4661">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="278161" url="https://bugzilla.redhat.com/show_bug.cgi?id=278161" xml:lang="en:us">
php size calculation in chunk_split
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow.  NOTE: this is due to an incomplete fix for CVE-2007-2872.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4661
https://nvd.nist.gov/vuln/detail/CVE-2007-4661
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4662">
    <Bugzilla id="278101" url="https://bugzilla.redhat.com/show_bug.cgi?id=278101" xml:lang="en:us">
php buffer overflow in php_openssl_make_REQ
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the php_openssl_make_REQ function in PHP before 5.2.4 has unknown impact and attack vectors.
    </Details>
    <Statement xml:lang="en:us">
This bug can only be triggered by supplying a non-default openssl.conf configuration file, which is entirely under the control of the script author or server administrator, and hence is not a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4662
https://nvd.nist.gov/vuln/detail/CVE-2007-4662
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4663">
    <Bugzilla id="277991" url="https://bugzilla.redhat.com/show_bug.cgi?id=277991" xml:lang="en:us">
php open_basedir bypass inside glob()
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in PHP before 5.2.4 allows attackers to bypass open_basedir restrictions via unspecified vectors involving the glob function.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4663
https://nvd.nist.gov/vuln/detail/CVE-2007-4663
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4670">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-30T00:00:00</PublicDate>
    <Bugzilla id="278041" url="https://bugzilla.redhat.com/show_bug.cgi?id=278041" xml:lang="en:us">
php malformed cookie handling
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an &quot;Improved fix for MOPB-03-2007,&quot; probably a variant of CVE-2007-1285.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-23T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0888">RHSA-2007:0888</Advisory>
        <Package name="php">php-0:4.1.2-2.19</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-09-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0889">RHSA-2007:0889</Advisory>
        <Package name="php">php-0:4.3.2-43.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:4.3.9-3.22.9</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0890">RHSA-2007:0890</Advisory>
        <Package name="php">php-0:5.1.6-15.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-10-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0891">RHSA-2007:0891</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.8</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4670
https://nvd.nist.gov/vuln/detail/CVE-2007-4670
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4721">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-04T00:00:00</PublicDate>
    <Bugzilla id="280821" url="https://bugzilla.redhat.com/show_bug.cgi?id=280821" xml:lang="en:us">
Infinite loop in wireshark's DNP3 dissector
    </Bugzilla>
    <CWE>CWE-835</CWE>
    <Details source="Red Hat" xml:lang="en:us">
No description is available for this CVE.
    </Details>
    <Statement xml:lang="en:us">
Duplicate of CVE-2007-6113.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4721
https://nvd.nist.gov/vuln/detail/CVE-2007-4721
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4730">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-09T00:00:00</PublicDate>
    <Bugzilla id="285991" url="https://bugzilla.redhat.com/show_bug.cgi?id=285991" xml:lang="en:us">
X.org composite extension buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the compNewPixmap function in compalloc.c in the Composite extension for the X.org X11 server before 1.4 allows local users to execute arbitrary code by copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is not affected by this flaw. More information can be found here:
https://bugzilla.redhat.com/show_bug.cgi?id=285991

Red Hat Enterprise Linux 2.1 and 3 do not support the composite extension and are not vulnerable to this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-09-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0898">RHSA-2007:0898</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.31</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4730
https://nvd.nist.gov/vuln/detail/CVE-2007-4730
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4743">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-05T00:00:00</PublicDate>
    <Bugzilla id="281561" url="https://bugzilla.redhat.com/show_bug.cgi?id=281561" xml:lang="en:us">
krb5 incomplete fix for CVE-2007-3999
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The original patch for CVE-2007-3999 in svc_auth_gss.c in the RPCSEC_GSS RPC library in MIT Kerberos 5 (krb5) 1.4 through 1.6.2, as used by the Kerberos administration daemon (kadmind) and other applications that use krb5, does not correctly check the buffer length in some environments and architectures, which might allow remote attackers to conduct a buffer overflow attack.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-09-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0892">RHSA-2007:0892</Advisory>
        <Package name="krb5">krb5-0:1.5-29</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4743
https://nvd.nist.gov/vuln/detail/CVE-2007-4743
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4752">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-04T00:00:00</PublicDate>
    <Bugzilla id="280361" url="https://bugzilla.redhat.com/show_bug.cgi?id=280361" xml:lang="en:us">
openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the OpenSSH packages as distributed with Red Hat Enterprise Linux 2.1 or 3, as they do not support Trusted X11 forwarding.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0855">RHSA-2008:0855</Advisory>
        <Package name="openssh">openssh-0:3.9p1-11.el4_7</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:rhel_eus:4.5">
        <ProductName>Red Hat Enterprise Linux 4.5 Z Stream</ProductName>
        <ReleaseDate>2008-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0855">RHSA-2008:0855</Advisory>
        <Package name="openssh">openssh-0:3.9p1-10.RHEL4.20</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-08-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0855">RHSA-2008:0855</Advisory>
        <Package name="openssh">openssh-0:4.3p2-26.el5_2.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4752
https://nvd.nist.gov/vuln/detail/CVE-2007-4752
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4766">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="392891" url="https://bugzilla.redhat.com/show_bug.cgi?id=392891" xml:lang="en:us">
: pcre &lt; 7.3 integer overflows
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in Perl-Compatible Regular Expression (PCRE) library before 7.3 allow context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via unspecified escape (backslash) sequences.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4766
https://nvd.nist.gov/vuln/detail/CVE-2007-4766
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4767">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="392901" url="https://bugzilla.redhat.com/show_bug.cgi?id=392901" xml:lang="en:us">
: pcre &lt; 7.3 \p, \P, \P{x] length calculation issue
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Perl-Compatible Regular Expression (PCRE) library before 7.3 does not properly compute the length of (1) a \p sequence, (2) a \P sequence, or (3) a \P{x} sequence, which allows context-dependent attackers to cause a denial of service (infinite loop or crash) or execute arbitrary code.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4767
https://nvd.nist.gov/vuln/detail/CVE-2007-4767
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4768">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="392911" url="https://bugzilla.redhat.com/show_bug.cgi?id=392911" xml:lang="en:us">
: pcre before 7.3 incorrect unicode in char class optimization
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to execute arbitrary code via a singleton Unicode sequence in a character class in a regex pattern, which is incorrectly optimized.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el3.with.oss</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:4">
        <ProductName>Extras for RHEL 4</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-12-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1126">RHSA-2007:1126</Advisory>
        <Package name="flash-plugin">flash-plugin-0:9.0.115.0-1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4768
https://nvd.nist.gov/vuln/detail/CVE-2007-4768
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4769">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2008-01-07T00:00:00</PublicDate>
    <Bugzilla id="315231" url="https://bugzilla.redhat.com/show_bug.cgi?id=315231" xml:lang="en:us">
postgresql integer overflow in regex code
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:7.4.19-1.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0040">RHSA-2008:0040</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el4s1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4769
https://nvd.nist.gov/vuln/detail/CVE-2007-4769
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4770">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2008-01-22T00:00:00</PublicDate>
    <Bugzilla id="429023" url="https://bugzilla.redhat.com/show_bug.cgi?id=429023" xml:lang="en:us">
libicu poor back reference validation
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libicu in International Components for Unicode (ICU) 3.8.1 and earlier attempts to process backreferences to the nonexistent capture group zero (aka \0), which might allow context-dependent attackers to read from, or write to, out-of-bounds memory locations, related to corruption of REStackFrames.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0090">RHSA-2008:0090</Advisory>
        <Package name="icu">icu-0:3.6-5.11.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4770
https://nvd.nist.gov/vuln/detail/CVE-2007-4770
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4771">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2008-01-22T00:00:00</PublicDate>
    <Bugzilla id="429025" url="https://bugzilla.redhat.com/show_bug.cgi?id=429025" xml:lang="en:us">
libicu incomplete interval handling
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the doInterval function in regexcmp.cpp in libicu in International Components for Unicode (ICU) 3.8.1 and earlier allows context-dependent attackers to cause a denial of service (memory consumption) and possibly have unspecified other impact via a regular expression that writes a large amount of data to the backtracking stack.  NOTE: some of these details are obtained from third party information.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-25T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0090">RHSA-2008:0090</Advisory>
        <Package name="icu">icu-0:3.6-5.11.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4771
https://nvd.nist.gov/vuln/detail/CVE-2007-4771
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4772">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2008-01-07T00:00:00</PublicDate>
    <Bugzilla id="316511" url="https://bugzilla.redhat.com/show_bug.cgi?id=316511" xml:lang="en:us">
postgresql DoS via infinite loop in regex NFA optimization code
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>1.5</CVSSBaseScore>
        <CVSSScoringVector>AV:L/AC:M/Au:S/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <CWE>CWE-835</CWE>
    <Details source="Mitre" xml:lang="en:us">
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0134">RHSA-2008:0134</Advisory>
        <Package name="tcltk">tcltk-0:8.3.3-75</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0134">RHSA-2008:0134</Advisory>
        <Package name="tcltk">tcltk-0:8.3.5-92.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:7.4.19-1.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-11T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0038">RHSA-2008:0038</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el5_1.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2013-01-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2013:0122">RHSA-2013:0122</Advisory>
        <Package name="tcl">tcl-0:8.4.13-6.el5</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-02-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0040">RHSA-2008:0040</Advisory>
        <Package name="postgresql">postgresql-0:8.1.11-1.el4s1.1</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>tcl</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4772
https://nvd.nist.gov/vuln/detail/CVE-2007-4772
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4774">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-12-17T00:00:00</PublicDate>
    <Bugzilla id="1858294" url="https://bugzilla.redhat.com/show_bug.cgi?id=1858294" xml:lang="en:us">
kernel: race condition can wake up a PTRACED process
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>5.1</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-362</CWE>
    <Details source="Mitre" xml:lang="en:us">
The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-alt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:8">
        <ProductName>Red Hat Enterprise Linux 8</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/a:redhat:enterprise_mrg:2">
        <ProductName>Red Hat Enterprise MRG 2</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>kernel-rt</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4774
https://nvd.nist.gov/vuln/detail/CVE-2007-4774
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4782">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-04T00:00:00</PublicDate>
    <Bugzilla id="285881" url="https://bugzilla.redhat.com/show_bug.cgi?id=285881" xml:lang="en:us">
php crash in glob() and fnmatch() functions
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a &quot;*[1]e&quot; value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue. For more information please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0544">RHSA-2008:0544</Advisory>
        <Package name="php">php-0:4.3.2-48.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0545">RHSA-2008:0545</Advisory>
        <Package name="php">php-0:4.3.9-3.22.12</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-07-16T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0544">RHSA-2008:0544</Advisory>
        <Package name="php">php-0:5.1.6-20.el5_2.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-07-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0582">RHSA-2008:0582</Advisory>
        <Package name="php">php-0:5.1.6-3.el4s1.10</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4782
https://nvd.nist.gov/vuln/detail/CVE-2007-4782
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4783">
    <Bugzilla id="285891" url="https://bugzilla.redhat.com/show_bug.cgi?id=285891" xml:lang="en:us">
php crash in iconv_substr() function
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The iconv_substr function in PHP 5.2.4 and earlier allows context-dependent attackers to cause (1) a denial of service (application crash) via a long string in the charset parameter, probably also requiring a long string in the str parameter; or (2) a denial of service (temporary application hang) via a long string in the str parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue. For more information please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4783
https://nvd.nist.gov/vuln/detail/CVE-2007-4783
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4784">
    <PublicDate>2007-09-04T00:00:00</PublicDate>
    <Bugzilla id="285901" url="https://bugzilla.redhat.com/show_bug.cgi?id=285901" xml:lang="en:us">
php crash in setlocale() function
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The setlocale function in PHP before 5.2.4 allows context-dependent attackers to cause a denial of service (application crash) via a long string in the locale parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue. For more information please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4784
https://nvd.nist.gov/vuln/detail/CVE-2007-4784
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4825">
    <Bugzilla id="287971" url="https://bugzilla.redhat.com/show_bug.cgi?id=287971" xml:lang="en:us">
php open_basedir restriction bypass and possible crash in dl() function
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in PHP 5.2.4 and earlier allows attackers to bypass open_basedir restrictions and possibly execute arbitrary code via a .. (dot dot) in the dl function.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue. For more information please see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4825
https://nvd.nist.gov/vuln/detail/CVE-2007-4825
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4826">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-07T00:00:00</PublicDate>
    <Bugzilla id="285691" url="https://bugzilla.redhat.com/show_bug.cgi?id=285691" xml:lang="en:us">
quagga bgpd DoS
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>3.3</CVSSBaseScore>
        <CVSSScoringVector>AV:A/AC:L/Au:N/C:N/I:N/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
bgpd in Quagga before 0.99.9 allows explicitly configured BGP peers to cause a denial of service (crash) via a malformed (1) OPEN message or (2) a COMMUNITY attribute, which triggers a NULL pointer dereference. NOTE: vector 2 only exists when debugging is enabled.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=285691

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2010-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0785">RHSA-2010:0785</Advisory>
        <Package name="quagga">quagga-0:0.98.3-4.el4_8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-10-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0785">RHSA-2010:0785</Advisory>
        <Package name="quagga">quagga-0:0.98.6-5.el5_5.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4826
https://nvd.nist.gov/vuln/detail/CVE-2007-4826
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4829">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-08-24T00:00:00</PublicDate>
    <Bugzilla id="295021" url="https://bugzilla.redhat.com/show_bug.cgi?id=295021" xml:lang="en:us">
perl-Archive-Tar directory traversal flaws
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>5.1</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:H/Au:N/C:P/I:P/A:P</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has &quot;..&quot; sequences.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-4829

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:
https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2010-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0505">RHSA-2010:0505</Advisory>
        <Package name="perl-Archive-Tar">perl-Archive-Tar-0:1.39.1-1.el4_8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2010-07-01T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0505">RHSA-2010:0505</Advisory>
        <Package name="perl-Archive-Tar">perl-Archive-Tar-1:1.39.1-1.el5_5.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4829
https://nvd.nist.gov/vuln/detail/CVE-2007-4829
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4840">
    <Details source="Mitre" xml:lang="en:us">
PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
    </Details>
    <Statement xml:lang="en:us">
We do not consider this to be a security issue. For more information please see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4840
https://nvd.nist.gov/vuln/detail/CVE-2007-4840
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4841">
    <Details source="Mitre" xml:lang="en:us">
Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid &quot;%&quot; encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable.  This flaw does not affect the Linux version of Firefox.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4841
https://nvd.nist.gov/vuln/detail/CVE-2007-4841
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4849">
    <Bugzilla id="289111" url="https://bugzilla.redhat.com/show_bug.cgi?id=289111" xml:lang="en:us">
jffs2 doesn't preserve permissions
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
JFFS2, as used on One Laptop Per Child (OLPC) build 542 and possibly other Linux systems, when POSIX ACL support is enabled, does not properly store permissions during (1) inode creation or (2) ACL setting, which might allow local users to access restricted files or directories after a remount of a filesystem, related to &quot;legacy modes&quot; and an inconsistency between dentry permissions and inode permissions.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. There is no support for jffs2 in the Linux kernel as distributed with Red Hat Enterprise Linux 2.1 or 3. There is no ACL support for jffs2 in the Linux kernel as distributed with Red Hat Enterprise Linux 4 or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4849
https://nvd.nist.gov/vuln/detail/CVE-2007-4849
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4850">
    <PublicDate>2008-01-22T00:00:00</PublicDate>
    <Bugzilla id="436541" url="https://bugzilla.redhat.com/show_bug.cgi?id=436541" xml:lang="en:us">
php: curl safe mode bypass
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence, a different vulnerability than CVE-2006-2563.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4850
https://nvd.nist.gov/vuln/detail/CVE-2007-4850
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4887">
    <Bugzilla id="290601" url="https://bugzilla.redhat.com/show_bug.cgi?id=290601" xml:lang="en:us">
php dl function flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The dl function in PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in the library parameter.  NOTE: there are limited usage scenarios under which this would be a vulnerability.
    </Details>
    <Statement xml:lang="en:us">
The argument passed to the dl() function must always be under the control of the script author. We therefore do not consider this to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4887
https://nvd.nist.gov/vuln/detail/CVE-2007-4887
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4889">
    <Bugzilla id="290591" url="https://bugzilla.redhat.com/show_bug.cgi?id=290591" xml:lang="en:us">
php mysql extension safemode flaw
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The MySQL extension in PHP 5.2.4 and earlier allows remote attackers to bypass safe_mode and open_basedir restrictions via the MySQL (1) LOAD_FILE, (2) INTO DUMPFILE, and (3) INTO OUTFILE functions, a different issue than CVE-2007-3997.
    </Details>
    <Statement xml:lang="en:us">
We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4889
https://nvd.nist.gov/vuln/detail/CVE-2007-4889
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4897">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-12T00:00:00</PublicDate>
    <Bugzilla id="292831" url="https://bugzilla.redhat.com/show_bug.cgi?id=292831" xml:lang="en:us">
ekiga GetHostAddress remote DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (application crash) via a long argument to the PString::vsprintf function, related to a &quot;memory management flaw&quot;. NOTE: this issue was originally reported as being in the SIPURL::GetHostAddress function in Ekiga (formerly GnomeMeeting).
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0932">RHSA-2007:0932</Advisory>
        <Package name="pwlib">pwlib-0:1.10.1-7.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4897
https://nvd.nist.gov/vuln/detail/CVE-2007-4897
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4904">
    <Details source="Mitre" xml:lang="en:us">
RealNetworks RealPlayer 10.1.0.3114 and earlier, and Helix Player 1.0.6.778 on Fedora Core 6 (FC6) and possibly other platforms, allow user-assisted remote attackers to cause a denial of service (application crash) via a malformed .au file that triggers a divide-by-zero error.
    </Details>
    <Statement xml:lang="en:us">
We do not consider a crash of a client application such as RealPlayer or Helix Player to be a security issue.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4904
https://nvd.nist.gov/vuln/detail/CVE-2007-4904
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4924">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-17T00:00:00</PublicDate>
    <Bugzilla id="296371" url="https://bugzilla.redhat.com/show_bug.cgi?id=296371" xml:lang="en:us">
ekiga remote crash caused by insufficient input validation
    </Bugzilla>
    <CWE>CWE-20</CWE>
    <Details source="Mitre" xml:lang="en:us">
The Open Phone Abstraction Library (opal), as used by (1) Ekiga before 2.0.10 and (2) OpenH323 before 2.2.4, allows remote attackers to cause a denial of service (crash) via an invalid Content-Length header field in Session Initiation Protocol (SIP) packets, which causes a \0 byte to be written to an &quot;attacker-controlled address.&quot;
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0957">RHSA-2007:0957</Advisory>
        <Package name="opal">opal-0:2.2.2-1.1.0.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4924
https://nvd.nist.gov/vuln/detail/CVE-2007-4924
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4965">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-16T00:00:00</PublicDate>
    <Bugzilla id="295971" url="https://bugzilla.redhat.com/show_bug.cgi?id=295971" xml:lang="en:us">
python imageop module heap corruption
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=295971

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.2.3-6.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-12-10T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1076">RHSA-2007:1076</Advisory>
        <Package name="python">python-0:2.3.4-14.4.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2009-07-27T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2009:1176">RHSA-2009:1176</Advisory>
        <Package name="python">python-0:2.4.3-24.el5_3.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0525">RHSA-2008:0525</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.0.2-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0264">RHSA-2008:0264</Advisory>
        <Package name="rhn_solaris_bootstrap_5_0_2_3">rhn_solaris_bootstrap_5_0_2_3-0:1-0</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn-solaris-bootstrap">rhn-solaris-bootstrap-0:5.1.1-3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.1::el4">
        <ProductName>Red Hat Network Satellite Server v 5.1</ProductName>
        <ReleaseDate>2008-08-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0629">RHSA-2008:0629</Advisory>
        <Package name="rhn_solaris_bootstrap_5_1_1_3">rhn_solaris_bootstrap_5_1_1_3-0:1-0</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4965
https://nvd.nist.gov/vuln/detail/CVE-2007-4965
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4974">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-16T00:00:00</PublicDate>
    <Bugzilla id="430486" url="https://bugzilla.redhat.com/show_bug.cgi?id=430486" xml:lang="en:us">
Heap overflow in libsndfile triggerable by seeks
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in the flac_buffer_copy function in libsndfile 1.0.17 and earlier might allow remote attackers to execute arbitrary code via a FLAC file with crafted PCM data containing a block with a size that exceeds the previous block size.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4974
https://nvd.nist.gov/vuln/detail/CVE-2007-4974
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4985">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="310091" url="https://bugzilla.redhat.com/show_bug.cgi?id=310091" xml:lang="en:us">
Infinite loops in ImageMagick's XCF and DCM coders
    </Bugzilla>
    <CWE>CWE-835</CWE>
    <Details source="Mitre" xml:lang="en:us">
ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0165">RHSA-2008:0165</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.2.8.0-4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4985
https://nvd.nist.gov/vuln/detail/CVE-2007-4985
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4986">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="310121" url="https://bugzilla.redhat.com/show_bug.cgi?id=310121" xml:lang="en:us">
Multiple integer overflows in ImageMagick
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Multiple integer overflows in ImageMagick before 6.3.5-9 allow context-dependent attackers to execute arbitrary code via a crafted (1) .dcm, (2) .dib, (3) .xbm, (4) .xcf, or (5) .xwd image file, which triggers a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0165">RHSA-2008:0165</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.3.8-21</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.2.8.0-4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4986
https://nvd.nist.gov/vuln/detail/CVE-2007-4986
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4987">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="310101" url="https://bugzilla.redhat.com/show_bug.cgi?id=310101" xml:lang="en:us">
ImageMagick writes terminating NUL one byte beyond char array end
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the ReadBlobString function in blob.c in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted image file, which triggers the writing of a '\0' character to an out-of-bounds address.
    </Details>
    <Statement xml:lang="en:us">
Note: As the address of the overwritten byte is not under attackers control, the worst impact his bug could have is an application crash. It can not be exploited to execute arbitrary code.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4987
https://nvd.nist.gov/vuln/detail/CVE-2007-4987
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4988">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-19T00:00:00</PublicDate>
    <Bugzilla id="310081" url="https://bugzilla.redhat.com/show_bug.cgi?id=310081" xml:lang="en:us">
Integer overflow in ImageMagick's DIB coder
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:5.5.6-28</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.0.7.1-17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-04-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0145">RHSA-2008:0145</Advisory>
        <Package name="ImageMagick">ImageMagick-0:6.2.8.0-4.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4988
https://nvd.nist.gov/vuln/detail/CVE-2007-4988
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4990">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-10-02T00:00:00</PublicDate>
    <Bugzilla id="322961" url="https://bugzilla.redhat.com/show_bug.cgi?id=322961" xml:lang="en:us">
xfs heap overflow in the swap_char2b function
    </Bugzilla>
    <CWE>CWE-122</CWE>
    <Details source="Mitre" xml:lang="en:us">
The swap_char2b function in X.Org X Font Server (xfs) before 1.0.5 allows context-dependent attackers to execute arbitrary code via (1) QueryXBitmaps and (2) QueryXExtents protocol requests with crafted size values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
    </Details>
    <Statement xml:lang="en:us">
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0029">RHSA-2008:0029</Advisory>
        <Package name="XFree86">XFree86-0:4.1.0-86.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-18T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0029">RHSA-2008:0029</Advisory>
        <Package name="XFree86">XFree86-0:4.3.0-126.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0030">RHSA-2008:0030</Advisory>
        <Package name="xorg-x11">xorg-x11-0:6.8.2-1.EL.33.0.2</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>xorg-x11-xfs</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4990
https://nvd.nist.gov/vuln/detail/CVE-2007-4990
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4993">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-22T00:00:00</PublicDate>
    <Bugzilla id="302801" url="https://bugzilla.redhat.com/show_bug.cgi?id=302801" xml:lang="en:us">
xen guest root can escape to domain 0 through pygrub
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privileges in the guest domain to execute arbitrary commands in domain 0 via a crafted grub.conf file whose contents are used in exec statements.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-02T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0323">RHSA-2007:0323</Advisory>
        <Package name="xen">xen-0:3.0.3-25.0.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4993
https://nvd.nist.gov/vuln/detail/CVE-2007-4993
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4994">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-10-08T00:00:00</PublicDate>
    <Bugzilla id="304571" url="https://bugzilla.redhat.com/show_bug.cgi?id=304571" xml:lang="en:us">
rhcs CRL can get corrupted
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Certificate Server 7.2 in Red Hat Certificate System (RHCS) does not properly handle new revocations that occur while a Certificate Revocation List (CRL) is being generated, which might prevent certain revoked certificates from appearing on the CRL quickly and allow users with revoked certificates to bypass the intended CRL.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.2">
        <ProductName>Red Hat Certificate System 7.2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0934">RHSA-2007:0934</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.2.0-4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.2">
        <ProductName>Red Hat Certificate System 7.2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0934">RHSA-2007:0934</Advisory>
        <Package name="rhpki-common">rhpki-common-0:7.2.0-8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.2">
        <ProductName>Red Hat Certificate System 7.2 for RHEL 4</ProductName>
        <ReleaseDate>2007-10-08T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0934">RHSA-2007:0934</Advisory>
        <Package name="rhpki-util">rhpki-util-0:7.2.0-4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2008-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0566">RHSA-2008:0566</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-11.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2008-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0566">RHSA-2008:0566</Advisory>
        <Package name="rhpki-common">rhpki-common-0:7.3.0-34.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2008-07-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0566">RHSA-2008:0566</Advisory>
        <Package name="rhpki-util">rhpki-util-0:7.3.0-18.el4</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4994
https://nvd.nist.gov/vuln/detail/CVE-2007-4994
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4995">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-12T00:00:00</PublicDate>
    <Bugzilla id="321191" url="https://bugzilla.redhat.com/show_bug.cgi?id=321191" xml:lang="en:us">
openssl dtls out of order vulnerabilitiy
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
    </Details>
    <Statement xml:lang="en:us">
This issue did not affect the versions of OpenSSL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.

Please note that the CVE description is incorrect, this issue did not affect upstream versions of OpenSSL prior to 0.9.8.
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0964">RHSA-2007:0964</Advisory>
        <Package name="openssl">openssl-0:0.9.8b-8.3.el5_0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4995
https://nvd.nist.gov/vuln/detail/CVE-2007-4995
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4996">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-09-27T00:00:00</PublicDate>
    <Bugzilla id="314451" url="https://bugzilla.redhat.com/show_bug.cgi?id=314451" xml:lang="en:us">
MSN nudges sent from unknown buddies can cause libpurple to crash
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
libpurple in Pidgin before 2.2.1 does not properly handle MSN nudge messages from users who are not on the receiver's buddy list, which allows remote attackers to cause a denial of service (crash) via a nudge message that triggers an access of &quot;an invalid memory location.&quot;
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of Pidgin or Gaim as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4996
https://nvd.nist.gov/vuln/detail/CVE-2007-4996
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4997">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-10-02T00:00:00</PublicDate>
    <Bugzilla id="346341" url="https://bugzilla.redhat.com/show_bug.cgi?id=346341" xml:lang="en:us">
kernel ieee80211 off-by-two integer underflow
    </Bugzilla>
    <CWE>CWE-190</CWE>
    <Details source="Mitre" xml:lang="en:us">
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an &quot;off-by-two error.&quot;
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Chris Evans for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-12-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1104">RHSA-2007:1104</Advisory>
        <Package name="kernel">kernel-0:2.6.9-67.0.1.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-29T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0993">RHSA-2007:0993</Advisory>
        <Package name="kernel">kernel-0:2.6.18-53.1.4.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4997
https://nvd.nist.gov/vuln/detail/CVE-2007-4997
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4998">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2008-01-22T00:00:00</PublicDate>
    <Bugzilla id="356471" url="https://bugzilla.redhat.com/show_bug.cgi?id=356471" xml:lang="en:us">
cp symlink overwrite
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
cp, when running with an option to preserve symlinks on multiple OSes, allows local, user-assisted attackers to overwrite arbitrary files via a symlink attack using crafted directories containing multiple source files that are copied to the same destination.
    </Details>
    <Statement xml:lang="en:us">
This issue affects the busybox package in Red Hat Enterprise Linux 2.1, 3, 4, and 5,

This issue affects the fileutils package in Red Hat Enterprise Linux 2.1.

This issue affects the coreutils package in Red Hat Enterprise Linux 3.

The coreutils package in Red Hat Enterprise Linux 4 and 5 are not vulnerable to this issue.

Given this issue has minimal risk we do not intend to issues updates to correct this issue in affected versions of Red Hat Enterprise Linux.

For more information please see:
https://bugzilla.redhat.com/show_bug.cgi?id=356471
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4998
https://nvd.nist.gov/vuln/detail/CVE-2007-4998
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-4999">
    <Details source="Mitre" xml:lang="en:us">
libpurple in Pidgin 2.1.0 through 2.2.1, when using HTML logging, allows remote attackers to cause a denial of service (NULL dereference and application crash) via a message that contains invalid HTML data, a different vector than CVE-2007-4996.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of Pidgin or Gaim as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-4999
https://nvd.nist.gov/vuln/detail/CVE-2007-4999
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5000">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-12-11T00:00:00</PublicDate>
    <Bugzilla id="419931" url="https://bugzilla.redhat.com/show_bug.cgi?id=419931" xml:lang="en:us">
httpd: mod_imagemap XSS
    </Bugzilla>
    <CWE>CWE-79</CWE>
    <Details source="Mitre" xml:lang="en:us">
Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0004">RHSA-2008:0004</Advisory>
        <Package name="apache">apache-0:1.3.27-14.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0005">RHSA-2008:0005</Advisory>
        <Package name="httpd">httpd-0:2.0.46-70.ent</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0006">RHSA-2008:0006</Advisory>
        <Package name="httpd">httpd-0:2.0.52-38.ent.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0008">RHSA-2008:0008</Advisory>
        <Package name="httpd">httpd-0:2.2.3-11.el5_1.3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el3">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:4.2::el4">
        <ProductName>Red Hat Network Proxy v 4.2 (RHEL 4)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0523">RHSA-2008:0523</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_proxy:5.0::el4">
        <ProductName>Red Hat Network Proxy v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0263">RHSA-2008:0263</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el4">
        <ProductName>Red Hat Network Satellite Server v 4.2</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.37.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-9.RHEL3.8</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:4.2::el3">
        <ProductName>Red Hat Network Satellite Server v 4.2 (RHEL3)</ProductName>
        <ReleaseDate>2008-06-30T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0524">RHSA-2008:0524</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jabberd">jabberd-0:2.0s10-3.38.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="java-1.4.2-ibm">java-1.4.2-ibm-0:1.4.2.10-1jpp.2.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="jfreechart">jfreechart-0:0.9.20-3.rhn</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="openmotif21">openmotif21-0:2.1.30-11.RHEL4.6</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="perl-Crypt-CBC">perl-Crypt-CBC-0:2.24-1.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-apache">rhn-apache-0:1.3.27-36.rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modjk">rhn-modjk-0:1.2.23-2rhn.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modperl">rhn-modperl-0:1.29-16.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="rhn-modssl">rhn-modssl-0:2.8.12-8.rhn.10.rhel4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:network_satellite:5.0:el4">
        <ProductName>Red Hat Network Satellite Server v 5.0</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0261">RHSA-2008:0261</Advisory>
        <Package name="tomcat5">tomcat5-0:5.0.30-0jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2008-01-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0007">RHSA-2008:0007</Advisory>
        <Package name="httpd">httpd-0:2.0.59-1.el4s1.10</Package>
    </AffectedRelease>
    <PackageState cpe="cpe:/a:redhat:directory_server:8">
        <ProductName>Red Hat Directory Server 8</ProductName>
        <FixState>Will not fix</FixState>
        <PackageName>httpd</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5000
https://nvd.nist.gov/vuln/detail/CVE-2007-5000
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5001">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2008-05-07T00:00:00</PublicDate>
    <Bugzilla id="326251" url="https://bugzilla.redhat.com/show_bug.cgi?id=326251" xml:lang="en:us">
kernel asynchronous IO on a FIFO kernel panic
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2008-05-07T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0211">RHSA-2008:0211</Advisory>
        <Package name="kernel">kernel-0:2.4.21-57.EL</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5001
https://nvd.nist.gov/vuln/detail/CVE-2007-5001
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5007">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-06T00:00:00</PublicDate>
    <Bugzilla id="297581" url="https://bugzilla.redhat.com/show_bug.cgi?id=297581" xml:lang="en:us">
balsa: IMAP server triggerred stack overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect version of balsa as shipped with Red Hat Enterprise Linux 2.1.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5007
https://nvd.nist.gov/vuln/detail/CVE-2007-5007
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5020">
    <Details source="Mitre" xml:lang="en:us">
Unspecified vulnerability in Adobe Acrobat and Reader 8.1 on Windows allows remote attackers to execute arbitrary code via a crafted PDF file, related to the mailto: option and Internet Explorer 7 on Windows XP.  NOTE: this information is based upon a vague pre-advisory by a reliable researcher.
    </Details>
    <Statement xml:lang="en:us">
According to Abobe this issue affects only the Windows platform and therefore does not affect Adobe Acrobat Reader as distributed with Red Hat Enterprise Linux Extras.
http://www.adobe.com/support/security/advisories/apsa07-04.html
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5020
https://nvd.nist.gov/vuln/detail/CVE-2007-5020
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5034">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-02-24T00:00:00</PublicDate>
    <Bugzilla id="297611" url="https://bugzilla.redhat.com/show_bug.cgi?id=297611" xml:lang="en:us">
elinks reveals POST data to HTTPS proxy
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS.  NOTE: this issue only occurs when a proxy is defined for https.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-10-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0933">RHSA-2007:0933</Advisory>
        <Package name="elinks">elinks-0:0.9.2-3.3.5.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-03T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0933">RHSA-2007:0933</Advisory>
        <Package name="elinks">elinks-0:0.11.1-5.1.0.1.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5034
https://nvd.nist.gov/vuln/detail/CVE-2007-5034
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5045">
    <Details source="Mitre" xml:lang="en:us">
Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox &quot;-chrome&quot; argument.  NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of Firefox as shipped with Red Hat Enterprise Linux.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5045
https://nvd.nist.gov/vuln/detail/CVE-2007-5045
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5079">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2006-02-13T00:00:00</PublicDate>
    <Bugzilla id="181302" url="https://bugzilla.redhat.com/show_bug.cgi?id=181302" xml:lang="en:us">
gdm with xdmcp ignoring tcp_wrappers on x86_64
    </Bugzilla>
    <CVSS status="verified">
        <CVSSBaseScore>4.3</CVSSBaseScore>
        <CVSSScoringVector>AV:N/AC:M/Au:N/C:N/I:P/A:N</CVSSScoringVector>
    </CVSS>
    <Details source="Mitre" xml:lang="en:us">
Red Hat Enterprise Linux 4 does not properly compile and link gdm with tcp_wrappers on x86_64 platforms, which might allow remote attackers to bypass intended access restrictions.
    </Details>
    <Statement xml:lang="en:us">
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181302

The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/
    </Statement>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2010-08-26T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0657">RHSA-2010:0657</Advisory>
        <Package name="gdm">gdm-1:2.6.0.5-7.rhel4.19.el4_8.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5079
https://nvd.nist.gov/vuln/detail/CVE-2007-5079
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5080">
    <Details source="Mitre" xml:lang="en:us">
Integer overflow in RealNetworks RealPlayer 10 and 10.5, RealOne Player 1, and RealPlayer Enterprise for Windows allows remote attackers to execute arbitrary code via a crafted Lyrics3 2.00 tag in an MP3 file, resulting in a heap-based buffer overflow.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. This issue did not affect the versions of RealPlayer as shipped with Red Hat Enterprise Linux 3 Extras, 4 Extras, or 5 Supplementary.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5080
https://nvd.nist.gov/vuln/detail/CVE-2007-5080
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5081">
    <ThreatSeverity>Critical</ThreatSeverity>
    <PublicDate>2007-10-25T00:00:00</PublicDate>
    <Bugzilla id="353661" url="https://bugzilla.redhat.com/show_bug.cgi?id=353661" xml:lang="en:us">
realplayer rm file heap overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a crafted RM file.
    </Details>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:3">
        <ProductName>Extras for RHEL 3</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="realplayer">realplayer-0:10.0.9-0.rhel3.4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_extras:5">
        <ProductName>Supplementary for Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-08-17T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0841">RHSA-2007:0841</Advisory>
        <Package name="RealPlayer">RealPlayer-0:10.0.9-3.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5081
https://nvd.nist.gov/vuln/detail/CVE-2007-5081
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5087">
    <Bugzilla id="310441" url="https://bugzilla.redhat.com/show_bug.cgi?id=310441" xml:lang="en:us">
User triggerable kernel panic in ATM
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The ATM module in the Linux kernel before 2.4.35.3, when CLIP support is enabled, allows local users to cause a denial of service (kernel panic) by reading /proc/net/atm/arp before the CLIP module has been loaded.
    </Details>
    <Statement xml:lang="en:us">
Not vulnerable. These issues did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
    </Statement>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5087
https://nvd.nist.gov/vuln/detail/CVE-2007-5087
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5093">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-08-21T00:00:00</PublicDate>
    <Bugzilla id="306591" url="https://bugzilla.redhat.com/show_bug.cgi?id=306591" xml:lang="en:us">
kernel PWC driver DoS
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 &quot;relies on user space to close the device,&quot; which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked.  NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2008-11-19T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0972">RHSA-2008:0972</Advisory>
        <Package name="kernel">kernel-0:2.6.9-78.0.8.EL</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-05-20T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0275">RHSA-2008:0275</Advisory>
        <Package name="kernel">kernel-0:2.6.18-53.1.21.el5</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5093
https://nvd.nist.gov/vuln/detail/CVE-2007-5093
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5116">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-11-05T00:00:00</PublicDate>
    <Bugzilla id="323571" url="https://bugzilla.redhat.com/show_bug.cgi?id=323571" xml:lang="en:us">
perl regular expression UTF parsing errors
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
    </Details>
    <Acknowledgement xml:lang="en:us">
Red Hat would like to thank Tavis Ormandy and Will Drewry for reporting this issue.
    </Acknowledgement>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="ant">ant-0:1.6.5-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="avalon-logkit">avalon-logkit-0:1.2-2jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="axis">axis-0:1.2.1-1jpp_3rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-jaf">classpathx-jaf-0:1.0-2jpp_6rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="classpathx-mail">classpathx-mail-0:1.1.1-2jpp_8rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="geronimo-specs">geronimo-specs-0:1.0-0.M4.1jpp_10rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="jakarta-commons-modeler">jakarta-commons-modeler-0:2.0-3jpp_2rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="log4j">log4j-0:1.2.12-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="mx4j">mx4j-1:3.0.1-1jpp_4rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="pcsc-lite">pcsc-lite-0:1.3.3-3.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ca">rhpki-ca-0:7.3.0-20.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-java-tools">rhpki-java-tools-0:7.3.0-10.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-kra">rhpki-kra-0:7.3.0-14.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-manage">rhpki-manage-0:7.3.0-19.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-native-tools">rhpki-native-tools-0:7.3.0-6.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-ocsp">rhpki-ocsp-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="rhpki-tks">rhpki-tks-0:7.3.0-13.el4</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="tomcat5">tomcat5-0:5.5.23-0jpp_4rh.16</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xerces-j2">xerces-j2-0:2.7.1-1jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:certificate_system:7.3">
        <ProductName>Red Hat Certificate System 7.3</ProductName>
        <ReleaseDate>2010-08-04T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2010:0602">RHSA-2010:0602</Advisory>
        <Package name="xml-commons">xml-commons-0:1.3.02-2jpp_1rh</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0966">RHSA-2007:0966</Advisory>
        <Package name="perl">perl-2:5.8.0-97.EL3</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0966">RHSA-2007:0966</Advisory>
        <Package name="perl">perl-3:5.8.5-36.el4_5.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0966">RHSA-2007:0966</Advisory>
        <Package name="perl">perl-4:5.8.8-10.el5_0.2</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/a:redhat:rhel_application_stack:1">
        <ProductName>Red Hat Web Application Stack for RHEL 4</ProductName>
        <ReleaseDate>2007-11-05T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1011">RHSA-2007:1011</Advisory>
        <Package name="perl">perl-4:5.8.8-5.el4s1_2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5116
https://nvd.nist.gov/vuln/detail/CVE-2007-5116
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5135">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-27T00:00:00</PublicDate>
    <Bugzilla id="309801" url="https://bugzilla.redhat.com/show_bug.cgi?id=309801" xml:lang="en:us">
openssl: SSL_get_shared_ciphers() off-by-one
    </Bugzilla>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:2.1">
        <ProductName>Red Hat Enterprise Linux 2.1</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0813">RHSA-2007:0813</Advisory>
        <Package name="openssl">openssl-0:0.9.6b-48</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-10-22T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0813">RHSA-2007:0813</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-33.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:1003">RHSA-2007:1003</Advisory>
        <Package name="openssl">openssl-0:0.9.7a-43.17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-10-12T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0964">RHSA-2007:0964</Advisory>
        <Package name="openssl">openssl-0:0.9.8b-8.3.el5_0.2</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5135
https://nvd.nist.gov/vuln/detail/CVE-2007-5135
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5137">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-07T00:00:00</PublicDate>
    <Bugzilla id="290991" url="https://bugzilla.redhat.com/show_bug.cgi?id=290991" xml:lang="en:us">
Tk GIF processing buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first.  NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2008-02-21T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2008:0136">RHSA-2008:0136</Advisory>
        <Package name="tk">tk-0:8.4.13-5.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5137
https://nvd.nist.gov/vuln/detail/CVE-2007-5137
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5162">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-27T00:00:00</PublicDate>
    <Bugzilla id="313691" url="https://bugzilla.redhat.com/show_bug.cgi?id=313691" xml:lang="en:us">
Net: HTTP insufficient verification of SSL certificate
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
The connect method in lib/net/http.rb in the (1) Net::HTTP and (2) Net::HTTPS libraries in Ruby 1.8.5 and 1.8.6 does not verify that the commonName (CN) field in a server certificate matches the domain name in an HTTPS request, which makes it easier for remote attackers to intercept SSL transmissions via a man-in-the-middle attack or spoofed web site.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0961">RHSA-2007:0961</Advisory>
        <Package name="ruby">ruby-0:1.8.1-7.EL4.8.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-13T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0965">RHSA-2007:0965</Advisory>
        <Package name="ruby">ruby-0:1.8.5-5.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5162
https://nvd.nist.gov/vuln/detail/CVE-2007-5162
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5191">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-09-20T00:00:00</PublicDate>
    <Bugzilla id="320041" url="https://bugzilla.redhat.com/show_bug.cgi?id=320041" xml:lang="en:us">
util-linux (u)mount doesn't drop privileges properly when calling helpers
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
    </Details>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:3">
        <ProductName>Red Hat Enterprise Linux 3</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0969">RHSA-2007:0969</Advisory>
        <Package name="util-linux">util-linux-0:2.11y-31.24</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:4">
        <ProductName>Red Hat Enterprise Linux 4</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0969">RHSA-2007:0969</Advisory>
        <Package name="util-linux">util-linux-0:2.12a-17.el4_6.1</Package>
    </AffectedRelease>
    <AffectedRelease cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <ReleaseDate>2007-11-15T00:00:00</ReleaseDate>
        <Advisory type="RHSA" url="https://access.redhat.com/errata/RHSA-2007:0969">RHSA-2007:0969</Advisory>
        <Package name="util-linux">util-linux-0:2.13-0.45.el5_1.1</Package>
    </AffectedRelease>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5191
https://nvd.nist.gov/vuln/detail/CVE-2007-5191
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5197">
    <Bugzilla id="367471" url="https://bugzilla.redhat.com/show_bug.cgi?id=367471" xml:lang="en:us">
: mono Math.BigInteger buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5197
https://nvd.nist.gov/vuln/detail/CVE-2007-5197
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5198">
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2007-06-17T00:00:00</PublicDate>
    <Bugzilla id="315101" url="https://bugzilla.redhat.com/show_bug.cgi?id=315101" xml:lang="en:us">
nagios-plugins check_http buffer overflow
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading &quot;L&quot; characters.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5198
https://nvd.nist.gov/vuln/detail/CVE-2007-5198
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5199">
    <ThreatSeverity>Low</ThreatSeverity>
    <PublicDate>2007-09-28T00:00:00</PublicDate>
    <Bugzilla id="1484018" url="https://bugzilla.redhat.com/show_bug.cgi?id=1484018" xml:lang="en:us">
libxfont: single byte overflow in catalogue.c
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>3.3</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-193</CWE>
    <Details source="Mitre" xml:lang="en:us">
A single byte overflow in catalogue.c in X.Org libXfont 1.3.1 allows remote attackers to have unspecified impact.
    </Details>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:5">
        <ProductName>Red Hat Enterprise Linux 5</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libXfont</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:6">
        <ProductName>Red Hat Enterprise Linux 6</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libXfont</PackageName>
    </PackageState>
    <PackageState cpe="cpe:/o:redhat:enterprise_linux:7">
        <ProductName>Red Hat Enterprise Linux 7</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>libXfont</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5199
https://nvd.nist.gov/vuln/detail/CVE-2007-5199
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5200">
    <ThreatSeverity>Moderate</ThreatSeverity>
    <PublicDate>2007-10-14T00:00:00</PublicDate>
    <Bugzilla id="332401" url="https://bugzilla.redhat.com/show_bug.cgi?id=332401" xml:lang="en:us">
hugin unsafe temporary file usage
    </Bugzilla>
    <Details source="Mitre" xml:lang="en:us">
hugin, as used on various operating systems including SUSE openSUSE 10.2 and 10.3, allows local users to overwrite arbitrary files via a symlink attack on the hugin_debug_optim_results.txt temporary file.
    </Details>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2007-5200
https://nvd.nist.gov/vuln/detail/CVE-2007-5200
    </References>
</Vulnerability>

<Vulnerability name="CVE-2007-5201">
    <Bugzilla id="293081" url="https://bugzilla.redhat.com/show_bug.cgi?id=293081" xml:lang="en:us">
Duplicity discloses password in FTP backend
    </Bugzilla>
    <Details source="Mi