CVE-2004-0097
CVSS10.0
发布时间 :2004-03-03 00:00:00
修订时间 :2010-08-21 00:19:34
NMCPS    

[原文]Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as demonstrated by the NISCC/OUSPG PROTOS test suite for the H.225 protocol.


[CNNVD]多家厂商H.323协议实现多个安全漏洞(CNNVD-200403-046)

        
        H.323是由国际通信联盟公布的标准协议,是通讯信令、影音压缩规范及控制协议的组合,如包括VoIP,视频会议,管理H.323通信的网络设备。
        H.323协议实现包含多个漏洞,远程攻击者可以利用这个漏洞对H.323实现的设备和软件进行拒绝服务攻击,可能以进程权限在系统上执行任意指令。
        Oulu Security Programming Group (OUSPG)发现多个产品在处理H.323消息时存在漏洞,成功利用这些漏洞可导致执行任意指令或引起拒绝服务,也可能导致部分系统重新启动。目前没有详细漏洞细节提供。
        目前调查结果如下:
        3Com
        当前供应商没有对此问题进行声明
        Alcatel
        当前供应商没有对此问题进行声明
        Apple Computer Inc.
        Mac OS X and Mac OS X Server不受此漏洞影响
        AT&T
        当前供应商没有对此问题进行声明
        Avaya
        可查看NISCC Vulnerability Advisory 006489/H323:t http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Borderware
        当前供应商没有对此问题进行声明
        Check Point
        当前供应商没有对此问题进行声明
        BSDI
        当前供应商没有对此问题进行声明
        Cisco Systems Inc.
        请查如下地址http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
        Clavister
        当前供应商没有对此问题进行声明
        Computer Associates
        当前供应商没有对此问题进行声明
        Cyberguard
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Debian
        当前供应商没有对此问题进行声明
        D-Link Systems
        当前供应商没有对此问题进行声明
        Conectiva
        当前供应商没有对此问题进行声明
        EMC Corporation
        当前供应商没有对此问题进行声明
        Engarde
        当前供应商没有对此问题进行声明
        eSoft
        不受此漏洞影响
        Extreme Networks
        当前供应商没有对此问题进行声明
        F5 Networks
        当前供应商没有对此问题进行声明
        Foundry Networks Inc.
        当前供应商没有对此问题进行声明
        FreeBSD
        当前供应商没有对此问题进行声明
        Fujitsu
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Global Technology Associates
        当前供应商没有对此问题进行声明
        Hitachi
        可查看NISCC Vulnerability Advisory 006489/H323: http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Hewlett-Packard Company
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Ingrian Networks
        当前供应商没有对此问题进行声明
        Intel
        当前供应商没有对此问题进行声明
        Intoto
        当前供应商没有对此问题进行声明
        Juniper Networks
        当前供应商没有对此问题进行声明
        Lachman
        当前供应商没有对此问题进行声明
        Linksys
        当前供应商没有对此问题进行声明
        Lotus Software
        当前供应商没有对此问题进行声明
        Lucent Technologies
        可查看NISCC Vulnerability Advisory 006489/H323: http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Microsoft Corporation
        可查看如下安全公告http://www.microsoft.com/technet/security/bulletin/MS04-001.asp
        MontaVista Software
        当前供应商没有对此问题进行声明
        MandrakeSoft
        当前供应商没有对此问题进行声明
        Multi-Tech Systems Inc.
        当前供应商没有对此问题进行声明
        NEC Corporation
        当前供应商没有对此问题进行声明
        NetBSD
        NetBSD中H.323实现不作为操作系统一部分。
        Netfilter
        当前供应商没有对此问题进行声明
        NetScreen
        当前供应商没有对此问题进行声明
        Network Appliance
        当前供应商没有对此问题进行声明
        Nokia
        当前供应商没有对此问题进行声明
        Nortel Networks
        下面的Nortel Networks产品可能受此漏洞影响 :
        Business Communications Manager (BCM) (all versions);详细信息可参看Product Advisory Alert No. PAA 2003-0392-Global.
        Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway; 详细信息可参看Product Advisory Alert No. PAA-2003-0465-Global.
        需要更多信息可联系如下方法:
        North America: 1-800-4NORTEL or 1-800-466-7835
        Europe, Middle East and Africa: 00800 8008 9009, or +44 (0) 870 907 9009
        其他地域可参看如下信息
        http://www.nortelnetworks.com/help/contact/global/
        或者访问eService portal:http://www.nortelnetworks.com/cs
        Novell
        当前供应商没有对此问题进行声明
        Objective Systems Inc.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        OpenBSD
        当前供应商没有对此问题进行声明
        Openwall GNU/*/Linux
        当前供应商没有对此问题进行声明
        RadVision
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Red Hat Inc.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Oracle Corporation
        当前供应商没有对此问题进行声明
        Riverstone Networks
        当前供应商没有对此问题进行声明
        Secure Computing Corporation
        当前供应商没有对此问题进行声明
        SecureWorks
        当前供应商没有对此问题进行声明
        Sequent
        当前供应商没有对此问题进行声明
        Sony Corporation
        当前供应商没有对此问题进行声明
        Stonesoft
        当前供应商没有对此问题进行声明
        Sun Microsystems Inc.
        Sun SNMP 不提供对H.323的支持, 因此不受此漏洞影响
        SuSE Inc.
        当前供应商没有对此问题进行声明
        Symantec Corporation
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Unisys
        当前供应商没有对此问题进行声明
        TandBerg
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Tumbleweed Communications Corp.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        TurboLinux
        当前供应商没有对此问题进行声明
        uniGone
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        WatchGuard
        当前供应商没有对此问题进行声明
        Wirex
        当前供应商没有对此问题进行声明
        Wind River Systems Inc.
        当前供应商没有对此问题进行声明
        Xerox
        不受此漏洞影响,可查看如下回应信息:
        http://www.xerox.com/security.
        ZyXEL
        当前供应商没有对此问题进行声明
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:826RedHat Enterprise 3 Code Execution and DoS Vulnerabilities in PWLib
oval:org.mitre.oval:def:803RedHat Code Execution and DoS Vulnerabilities in PWLib
oval:org.mitre.oval:def:10056Multiple vulnerabilities in PWLib before 1.6.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code, as d...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0097
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0097
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-046
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/749342
(VENDOR_ADVISORY)  CERT-VN  VU#749342
http://www.cert.org/advisories/CA-2004-01.html
(VENDOR_ADVISORY)  CERT  CA-2004-01
http://www.redhat.com/support/errata/RHSA-2004-047.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:047
http://www.debian.org/security/2004/dsa-448
(VENDOR_ADVISORY)  DEBIAN  DSA-448
http://xforce.iss.net/xforce/xfdb/15202
(VENDOR_ADVISORY)  XF  pwlib-message-dos(15202)
http://www.securityfocus.com/bid/9406
(UNKNOWN)  BID  9406

- 漏洞信息

多家厂商H.323协议实现多个安全漏洞
危急 未知
2004-03-03 00:00:00 2005-10-20 00:00:00
远程  
        
        H.323是由国际通信联盟公布的标准协议,是通讯信令、影音压缩规范及控制协议的组合,如包括VoIP,视频会议,管理H.323通信的网络设备。
        H.323协议实现包含多个漏洞,远程攻击者可以利用这个漏洞对H.323实现的设备和软件进行拒绝服务攻击,可能以进程权限在系统上执行任意指令。
        Oulu Security Programming Group (OUSPG)发现多个产品在处理H.323消息时存在漏洞,成功利用这些漏洞可导致执行任意指令或引起拒绝服务,也可能导致部分系统重新启动。目前没有详细漏洞细节提供。
        目前调查结果如下:
        3Com
        当前供应商没有对此问题进行声明
        Alcatel
        当前供应商没有对此问题进行声明
        Apple Computer Inc.
        Mac OS X and Mac OS X Server不受此漏洞影响
        AT&T
        当前供应商没有对此问题进行声明
        Avaya
        可查看NISCC Vulnerability Advisory 006489/H323:t http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Borderware
        当前供应商没有对此问题进行声明
        Check Point
        当前供应商没有对此问题进行声明
        BSDI
        当前供应商没有对此问题进行声明
        Cisco Systems Inc.
        请查如下地址http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml
        Clavister
        当前供应商没有对此问题进行声明
        Computer Associates
        当前供应商没有对此问题进行声明
        Cyberguard
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Debian
        当前供应商没有对此问题进行声明
        D-Link Systems
        当前供应商没有对此问题进行声明
        Conectiva
        当前供应商没有对此问题进行声明
        EMC Corporation
        当前供应商没有对此问题进行声明
        Engarde
        当前供应商没有对此问题进行声明
        eSoft
        不受此漏洞影响
        Extreme Networks
        当前供应商没有对此问题进行声明
        F5 Networks
        当前供应商没有对此问题进行声明
        Foundry Networks Inc.
        当前供应商没有对此问题进行声明
        FreeBSD
        当前供应商没有对此问题进行声明
        Fujitsu
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Global Technology Associates
        当前供应商没有对此问题进行声明
        Hitachi
        可查看NISCC Vulnerability Advisory 006489/H323: http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Hewlett-Packard Company
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Ingrian Networks
        当前供应商没有对此问题进行声明
        Intel
        当前供应商没有对此问题进行声明
        Intoto
        当前供应商没有对此问题进行声明
        Juniper Networks
        当前供应商没有对此问题进行声明
        Lachman
        当前供应商没有对此问题进行声明
        Linksys
        当前供应商没有对此问题进行声明
        Lotus Software
        当前供应商没有对此问题进行声明
        Lucent Technologies
        可查看NISCC Vulnerability Advisory 006489/H323: http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Microsoft Corporation
        可查看如下安全公告http://www.microsoft.com/technet/security/bulletin/MS04-001.asp
        MontaVista Software
        当前供应商没有对此问题进行声明
        MandrakeSoft
        当前供应商没有对此问题进行声明
        Multi-Tech Systems Inc.
        当前供应商没有对此问题进行声明
        NEC Corporation
        当前供应商没有对此问题进行声明
        NetBSD
        NetBSD中H.323实现不作为操作系统一部分。
        Netfilter
        当前供应商没有对此问题进行声明
        NetScreen
        当前供应商没有对此问题进行声明
        Network Appliance
        当前供应商没有对此问题进行声明
        Nokia
        当前供应商没有对此问题进行声明
        Nortel Networks
        下面的Nortel Networks产品可能受此漏洞影响 :
        Business Communications Manager (BCM) (all versions);详细信息可参看Product Advisory Alert No. PAA 2003-0392-Global.
        Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway; 详细信息可参看Product Advisory Alert No. PAA-2003-0465-Global.
        需要更多信息可联系如下方法:
        North America: 1-800-4NORTEL or 1-800-466-7835
        Europe, Middle East and Africa: 00800 8008 9009, or +44 (0) 870 907 9009
        其他地域可参看如下信息
        http://www.nortelnetworks.com/help/contact/global/
        或者访问eService portal:http://www.nortelnetworks.com/cs
        Novell
        当前供应商没有对此问题进行声明
        Objective Systems Inc.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        OpenBSD
        当前供应商没有对此问题进行声明
        Openwall GNU/*/Linux
        当前供应商没有对此问题进行声明
        RadVision
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Red Hat Inc.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Oracle Corporation
        当前供应商没有对此问题进行声明
        Riverstone Networks
        当前供应商没有对此问题进行声明
        Secure Computing Corporation
        当前供应商没有对此问题进行声明
        SecureWorks
        当前供应商没有对此问题进行声明
        Sequent
        当前供应商没有对此问题进行声明
        Sony Corporation
        当前供应商没有对此问题进行声明
        Stonesoft
        当前供应商没有对此问题进行声明
        Sun Microsystems Inc.
        Sun SNMP 不提供对H.323的支持, 因此不受此漏洞影响
        SuSE Inc.
        当前供应商没有对此问题进行声明
        Symantec Corporation
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Unisys
        当前供应商没有对此问题进行声明
        TandBerg
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        Tumbleweed Communications Corp.
        可查看NISCC Vulnerability Advisory 006489/H323 at http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        TurboLinux
        当前供应商没有对此问题进行声明
        uniGone
        可查看NISCC Vulnerability Advisory 006489/H323:http://www.uniras.gov.uk/vuls/2004/006489/h323.htm
        WatchGuard
        当前供应商没有对此问题进行声明
        Wirex
        当前供应商没有对此问题进行声明
        Wind River Systems Inc.
        当前供应商没有对此问题进行声明
        Xerox
        不受此漏洞影响,可查看如下回应信息:
        http://www.xerox.com/security.
        ZyXEL
        当前供应商没有对此问题进行声明
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 通过包过滤对访问H.323服务进行限制,这可以最低限度的降低此漏洞危害,特定的设备一般需要过滤:
        1720/TCP
        1720/UDP
        注意这个是一般默认设备监听的端口。
        应该注意部分防火墙处理H.323包,因此它们也受此漏洞影响,如Cisco Security Advisory 20040113-h323(
        http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml#process)和Microsoft
Security Bulletin MS04-001(
        http://www.microsoft.com/technet/security/bulletin/ms04-001.asp),因此需要关闭对H.323网络包的检测。

        厂商补丁:
        Cisco
        -----
        Cisco已经为此发布了一个安全公告(cisco-sa-20040113-h323)以及相应补丁:
        cisco-sa-20040113-h323:Vulnerabilities in H.323 Message Processing
        链接:
        http://www.cisco.com/warp/public/707/cisco-sa-20040113-h323.shtml

        如果需要询问补丁信息,可联系Cisco Technical Assistance Center (TAC):
         * +1 800 553 2447 (北美地区免话费)
         * +1 408 526 7209 (全球收费)
         * e-mail: tac@cisco.com
        用户可查看
        http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml获得更多的TAC信息。

        CERT
        ----
        CERT已经为此发布了一个安全公告(CA-2004-01):
        CA-2004-01:Multiple H.323 Message Vulnerabilities
        链接:
        http://www.cert.org/advisories/CA-2004-01.html

- 漏洞信息 (F33050)

GLSA20040411.txt (PacketStormID:F33050)
2004-04-09 00:00:00
 
advisory,vulnerability,protocol
linux,gentoo
CVE-2004-0097
[点击下载]

Gentoo Linux Security Advisory GLSA 200404-11 - Multiple vulnerabilities have been found in the implementation of protocol H.323 contained in pwlib. Most of the vulnerabilities are in the parsing of ASN.1 elements which would allow an attacker to use a maliciously crafted ASN.1 element to cause unpredictable behavior in pwlib. Versions affected are 1.5.2-r2 and below.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200404-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                              http://security.gentoo.org
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

   Severity: High
      Title: Multiple Vulnerabilities in pwlib

       Date: April 09, 2004
       Bugs: #45846
         ID: 200404-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilites have been found in pwlib that may lead to a
remote denial of service or buffer overflow attack.

Background
==========

pwlib is a multi-platform library designed for OpenH323.

Affected packages
=================

     -------------------------------------------------------------------
      Package         /    Vulnerable    /                     Unaffected
     -------------------------------------------------------------------
      dev-libs/pwlib       <= 1.5.2-r2                        >= 1.5.2-r3

Description
===========

Multiple vulnerabilities have been found in the implimentation of
protocol H.323 contained in pwlib. Most of the vulnerabilies are in the
parsing of ASN.1 elements which would allow an attacker to use a
maliciously crafted ASN.1 element to cause unpredictable behavior in
pwlib.

Impact
======

An attacker may cause a denial of service condition or cause a buffer
overflow that would allow arbitrary code to be executed with root
privileges.

Workaround
==========

Blocking ports 1719 and 1720 may reduce the likelihood of an attack.
All users are advised to upgrade to the latest version of the affected
package.

Resolution
==========

All pwlib users are advised to upgrade to version 1.5.2-r3 or later:

     # emerge sync

     # emerge -pv ">=dev-libs/pwlib-1.5.2-r3"
     # emerge ">=dev-libs/pwlib-1.5.2-r3"

References
==========

   [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097
   [ 2 ] http://www.uniras.gov.uk/vuls/2004/006489/h323.htm

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

      http://security.gentoo.org/glsa/glsa-200404-11.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2004 Gentoo Technologies, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0
    

- 漏洞信息

Multiple Vendor H.323 Protocol Implementation Vulnerabilities
Unknown 9406
Yes No
2004-01-13 12:00:00 2007-11-15 12:39:00
Credited to the University of Oulu Security Programming Group.

- 受影响的程序版本

Sun SunForum 3D 1.0
Sun SunForum 3.2
RedHat pwlib-1.3.3-5.i386.rpm
RedHat pwlib-1.2.12-3.i386.rpm
RedHat Linux 9.0 i386
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
pwlib pwlib 1.5 .0
pwlib pwlib 1.4.7
Nortel Networks Wireless IP Gateway (802.11)
Nortel Networks Succession 1000
Nortel Networks Business Communications Manager 0
Microsoft ISA Server 2000 SP1
Microsoft ISA Server 2000 FP1
Microsoft ISA Server 2000
+ Microsoft Small Business Server 2000 0
+ Microsoft Small Business Server 2003 Premium Edition
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server
Intel Corporation NetStructure PBX-IP Media Gateway
Intel Corporation NetStructure IPT IP Boards
Intel Corporation NetStructure Host Media Processing Software 1.0
Intel Corporation NetStructure DMIP IP Boards
HP OpenCall MultiService Controller 1.2
HP OpenCall MultiService Controller 1.1 patch 46
+ HP HP-UX 11.0
HP OpenCall MultiService Controller 1.1 patch 37
First Virtual Communications V-Gate 5000
First Virtual Communications V-Gate 4000
First Virtual Communications Conference Server
First Virtual Communications Click to Meet Premier
First Virtual Communications Click to Meet Express 2.2
First Virtual Communications Click to Meet Express 2.1
First Virtual Communications Click to Meet Express 2.0
First Virtual Communications Click to Meet Express 1.0 2
First Virtual Communications Click to Meet Express 1.0
Cisco IP Phone 7905
Cisco IOS 11.3.11 b
Cisco IOS 11.3.1 T
Cisco IOS 11.3.1 ED
Cisco IOS 11.3.1
Cisco IOS 12.3T
Cisco IOS 12.2ZL
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZJ
Cisco IOS 12.2ZH
Cisco IOS 12.2ZH
Cisco IOS 12.2ZG
Cisco IOS 12.2ZG
Cisco IOS 12.2ZF
Cisco IOS 12.2ZF
Cisco IOS 12.2ZE
Cisco IOS 12.2ZE
Cisco IOS 12.2ZD
Cisco IOS 12.2ZD
Cisco IOS 12.2ZC
Cisco IOS 12.2ZC
Cisco IOS 12.2ZB
Cisco IOS 12.2ZB
Cisco IOS 12.2YZ
Cisco IOS 12.2YZ
Cisco IOS 12.2YY
Cisco IOS 12.2YY
Cisco IOS 12.2YX
Cisco IOS 12.2YX
Cisco IOS 12.2YW
Cisco IOS 12.2YW
Cisco IOS 12.2YW
Cisco IOS 12.2YV
Cisco IOS 12.2YV
Cisco IOS 12.2YU
Cisco IOS 12.2YU
Cisco IOS 12.2YT
Cisco IOS 12.2YT
Cisco IOS 12.2YN
Cisco IOS 12.2YN
Cisco IOS 12.2YM
Cisco IOS 12.2YM
Cisco IOS 12.2YL
Cisco IOS 12.2YL
Cisco IOS 12.2YK
Cisco IOS 12.2YK
Cisco IOS 12.2YJ
Cisco IOS 12.2YH
Cisco IOS 12.2YG
Cisco IOS 12.2YF
Cisco IOS 12.2YD
Cisco IOS 12.2YC
Cisco IOS 12.2YB
Cisco IOS 12.2YA
Cisco IOS 12.2XW
Cisco IOS 12.2XU
Cisco IOS 12.2XT
Cisco IOS 12.2XS
Cisco IOS 12.2XR
Cisco IOS 12.2XQ
Cisco IOS 12.2XQ
Cisco IOS 12.2XN
Cisco IOS 12.2XM
Cisco IOS 12.2XL
Cisco IOS 12.2XK
Cisco IOS 12.2XK
Cisco IOS 12.2XK
Cisco IOS 12.2XJ
Cisco IOS 12.2XJ
Cisco IOS 12.2XI
Cisco IOS 12.2XH
Cisco IOS 12.2XG
Cisco IOS 12.2XD
Cisco IOS 12.2XC
Cisco IOS 12.2XB
Cisco IOS 12.2XA
Cisco IOS 12.2T
Cisco IOS 12.2SY
Cisco IOS 12.2SY
Cisco IOS 12.2SX
Cisco IOS 12.2S
Cisco IOS 12.2MX
Cisco IOS 12.2MX
Cisco IOS 12.2MC
Cisco IOS 12.2MC
Cisco IOS 12.2DX
Cisco IOS 12.2DX
Cisco IOS 12.2DD
Cisco IOS 12.2BX
Cisco IOS 12.2BW
Cisco IOS 12.2B
Cisco IOS 12.2(9)S
Cisco IOS 12.2(8)ZB7
Cisco IOS 12.2(8)YY3
Cisco IOS 12.2(8)YY
Cisco IOS 12.2(8)YW2
Cisco IOS 12.2(8)YD
Cisco IOS 12.2(8)T10
Cisco IOS 12.2(8)T
Cisco IOS 12.2(7a)
Cisco IOS 12.2(7.4)S
Cisco IOS 12.2(7)
Cisco IOS 12.2(6c)
Cisco IOS 12.2(6.8)T1a
Cisco IOS 12.2(6.8)T0a
Cisco IOS 12.2(5d)
Cisco IOS 12.2(5)
Cisco IOS 12.2(4)YB
Cisco IOS 12.2(4)YA1
Cisco IOS 12.2(4)YA
Cisco IOS 12.2(4)XW1
Cisco IOS 12.2(4)XW
Cisco IOS 12.2(4)XM2
Cisco IOS 12.2(4)XM
Cisco IOS 12.2(4)XL4
Cisco IOS 12.2(4)XL
Cisco IOS 12.2(4)T6
Cisco IOS 12.2(4)T3
Cisco IOS 12.2(4)T
Cisco IOS 12.2(4)MX1
Cisco IOS 12.2(4)MX
Cisco IOS 12.2(4)BX
Cisco IOS 12.2(4)BX
Cisco IOS 12.2(4)
Cisco IOS 12.2(3d)
Cisco IOS 12.2(3)
Cisco IOS 12.2(2.2)T
Cisco IOS 12.2(2)XU2
Cisco IOS 12.2(2)XU
Cisco IOS 12.2(2)XT3
Cisco IOS 12.2(2)XT
Cisco IOS 12.2(2)XN
Cisco IOS 12.2(2)XK2
Cisco IOS 12.2(2)XK
Cisco IOS 12.2(2)XJ1
Cisco IOS 12.2(2)XJ
Cisco IOS 12.2(2)XI2
Cisco IOS 12.2(2)XI1
Cisco IOS 12.2(2)XI
Cisco IOS 12.2(2)XH3
Cisco IOS 12.2(2)XH2
Cisco IOS 12.2(2)XH
Cisco IOS 12.2(2)XG
Cisco IOS 12.2(2)XB4
Cisco IOS 12.2(2)XB3
Cisco IOS 12.2(2)XB11
Cisco IOS 12.2(2)XB11
Cisco IOS 12.2(2)XB
Cisco IOS 12.2(2)XA5
Cisco IOS 12.2(2)XA1
Cisco IOS 12.2(2)XA
Cisco IOS 12.2(2)T4
Cisco IOS 12.2(2)DD3
Cisco IOS 12.2(1d)
Cisco IOS 12.2(1b)
Cisco IOS 12.2(18.2)
Cisco IOS 12.2(17)
Cisco IOS 12.2(17)
Cisco IOS 12.2(16.5)S
Cisco IOS 12.2(16)BX
Cisco IOS 12.2(15.1)S
Cisco IOS 12.2(15)ZL
Cisco IOS 12.2(15)ZJ1
Cisco IOS 12.2(15)T5
Cisco IOS 12.2(15)T
Cisco IOS 12.2(14.5)T
Cisco IOS 12.2(14.5)
Cisco IOS 12.2(14)SY1
Cisco IOS 12.2(14)SX1
Cisco IOS 12.2(14)S
Cisco IOS 12.2(13a)
Cisco IOS 12.2(13)ZH
Cisco IOS 12.2(13)ZC
Cisco IOS 12.2(13)T1
Cisco IOS 12.2(13)MC1
Cisco IOS 12.2(12b)
Cisco IOS 12.2(12.05)T
Cisco IOS 12.2(12.05)S
Cisco IOS 12.2(12.05)
Cisco IOS 12.2(12.02)T
Cisco IOS 12.2(12.02)S
Cisco IOS 12.2(11)YZ2
Cisco IOS 12.2(11)YX1
Cisco IOS 12.2(11)T9
Cisco IOS 12.2(11)T3
Cisco IOS 12.2(11)T
Cisco IOS 12.2(1.4)S
Cisco IOS 12.2(1.1)
Cisco IOS 12.2(1)XS1
Cisco IOS 12.2(1)XS
Cisco IOS 12.2(1)XQ
Cisco IOS 12.2(1)XH
Cisco IOS 12.2(1)XD4
Cisco IOS 12.2(1)XD3
Cisco IOS 12.2(1)XD1
Cisco IOS 12.2(1)XD1
Cisco IOS 12.2(1)XD
Cisco IOS 12.2(1)XA
Cisco IOS 12.2(1)T
Cisco IOS 12.2(1)S
Cisco IOS 12.2(1)DX
Cisco IOS 12.2(1)
Cisco IOS 12.2
Cisco IOS 12.1YJ
Cisco IOS 12.1YI
Cisco IOS 12.1YH
Cisco IOS 12.1YF
Cisco IOS 12.1YE
Cisco IOS 12.1YD
Cisco IOS 12.1YC
Cisco IOS 12.1YB
Cisco IOS 12.1XW
Cisco IOS 12.1XV
Cisco IOS 12.1XU
Cisco IOS 12.1XT
Cisco IOS 12.1XR
Cisco IOS 12.1XQ
Cisco IOS 12.1XP
Cisco IOS 12.1XM
Cisco IOS 12.1XL
Cisco IOS 12.1XJ
Cisco IOS 12.1XI
Cisco IOS 12.1XH
Cisco IOS 12.1XG
Cisco IOS 12.1XD
Cisco IOS 12.1XC
Cisco IOS 12.1XB
Cisco IOS 12.1XA
Cisco IOS 12.1X(l)
Cisco IOS 12.1T
Cisco IOS 12.1T
Cisco IOS 12.1EZ
Cisco IOS 12.1EC
Cisco IOS 12.1E
Cisco IOS 12.1AA
Cisco IOS 12.1(9a)
Cisco IOS 12.1(9)E3
Cisco IOS 12.1(9)E
Cisco IOS 12.1(9)AA
Cisco IOS 12.1(9)
Cisco IOS 12.1(8c)
Cisco IOS 12.1(8b)E9
Cisco IOS 12.1(8b)E8
Cisco IOS 12.1(8b)E14
Cisco IOS 12.1(8a)E
Cisco IOS 12.1(8)E
Cisco IOS 12.1(8)AA1
Cisco IOS 12.1(8)
Cisco IOS 12.1(7b)
Cisco IOS 12.1(7a)E6
Cisco IOS 12.1(7)EC
Cisco IOS 12.1(7)
Cisco IOS 12.1(6a)
Cisco IOS 12.1(6.5)EC3
Cisco IOS 12.1(6)EZ2
Cisco IOS 12.1(6)EZ1
Cisco IOS 12.1(6)E8
Cisco IOS 12.1(6)E12
Cisco IOS 12.1(5e)
Cisco IOS 12.1(5c)E12
Cisco IOS 12.1(5a)E
Cisco IOS 12.1(5)YI1
Cisco IOS 12.1(5)YI
Cisco IOS 12.1(5)YH3
Cisco IOS 12.1(5)YH
Cisco IOS 12.1(5)YF4
Cisco IOS 12.1(5)YF2
Cisco IOS 12.1(5)YF
Cisco IOS 12.1(5)YD6
Cisco IOS 12.1(5)YD2
Cisco IOS 12.1(5)YD
Cisco IOS 12.1(5)YC2
Cisco IOS 12.1(5)YC1
Cisco IOS 12.1(5)YC
Cisco IOS 12.1(5)YB5
Cisco IOS 12.1(5)YB4
Cisco IOS 12.1(5)YB
Cisco IOS 12.1(5)XY6
Cisco IOS 12.1(5)XV5
Cisco IOS 12.1(5)XV4
Cisco IOS 12.1(5)XV3
Cisco IOS 12.1(5)XV
Cisco IOS 12.1(5)XU1
Cisco IOS 12.1(5)XS2
Cisco IOS 12.1(5)XS
Cisco IOS 12.1(5)XR2
Cisco IOS 12.1(5)XM7
Cisco IOS 12.1(5)XM4
Cisco IOS 12.1(5)XM
Cisco IOS 12.1(5)XG5
Cisco IOS 12.1(5)T9
Cisco IOS 12.1(5)T15
Cisco IOS 12.1(5)T12
Cisco IOS 12.1(5)T
Cisco IOS 12.1(4a)
Cisco IOS 12.1(4.3)T
Cisco IOS 12.1(4)XM4
Cisco IOS 12.1(4)E3
Cisco IOS 12.1(4)
Cisco IOS 12.1(3b)
Cisco IOS 12.1(3a)E8
Cisco IOS 12.1(3a)E7
Cisco IOS 12.1(3)XT3
Cisco IOS 12.1(3)XT
Cisco IOS 12.1(3)XQ
Cisco IOS 12.1(3)XP4
Cisco IOS 12.1(3)XP
Cisco IOS 12.1(3)XI
Cisco IOS 12.1(2b)
Cisco IOS 12.1(20)E
Cisco IOS 12.1(20)
Cisco IOS 12.1(2)E1
Cisco IOS 12.1(1c)
Cisco IOS 12.1(19.3)E
Cisco IOS 12.1(19)EC
Cisco IOS 12.1(19)E
Cisco IOS 12.1(18.4)
Cisco IOS 12.1(14)E4
Cisco IOS 12.1(14)E4
Cisco IOS 12.1(14)E1
Cisco IOS 12.1(13.4)E
Cisco IOS 12.1(13)E7
Cisco IOS 12.1(13)E3
Cisco IOS 12.1(13)
Cisco IOS 12.1(12c)EC
Cisco IOS 12.1(12c)E7
Cisco IOS 12.1(12b)
Cisco IOS 12.1(12)E
Cisco IOS 12.1(11b)E12
Cisco IOS 12.1(11b)E
Cisco IOS 12.1(11b)
Cisco IOS 12.1(11)EC
Cisco IOS 12.1(11)E
Cisco IOS 12.1(11)
Cisco IOS 12.1(10a)
Cisco IOS 12.1(10)EC1
Cisco IOS 12.1(10)E4
Cisco IOS 12.1(10)E
Cisco IOS 12.1(10)AA
Cisco IOS 12.1(1.3)T
Cisco IOS 12.1(1)T
Cisco IOS 12.1(1)E5
Cisco IOS 12.1(1)
Cisco IOS 12.1
Cisco IOS 12.0XT
Cisco IOS 12.0XR
Cisco IOS 12.0XQ
Cisco IOS 12.0XN
Cisco IOS 12.0XL
Cisco IOS 12.0XK
Cisco IOS 12.0XJ
Cisco IOS 12.0XI
Cisco IOS 12.0XH
Cisco IOS 12.0XG
Cisco IOS 12.0XD
Cisco IOS 12.0XC
Cisco IOS 12.0T
Cisco IOS 12.0T
Cisco IOS 12.0ST
Cisco IOS 12.0S
Cisco IOS 12.0(9a)
Cisco IOS 12.0(9)S8
Cisco IOS 12.0(9)S
Cisco IOS 12.0(9)
Cisco IOS 12.0(8a)
Cisco IOS 12.0(8.0.2)S
Cisco IOS 12.0(8)S1
Cisco IOS 12.0(8)S1
Cisco IOS 12.0(8)
Cisco IOS 12.0(7a)
Cisco IOS 12.0(7.4)S
Cisco IOS 12.0(7)T3
Cisco IOS 12.0(7)T2
Cisco IOS 12.0(7)T
Cisco IOS 12.0(7)S1
Cisco IOS 12.0(6b)
Cisco IOS 12.0(5)XN1
Cisco IOS 12.0(5)XN
Cisco IOS 12.0(5)XK2
Cisco IOS 12.0(5)XK
Cisco IOS 12.0(5)T1
Cisco IOS 12.0(5)T
Cisco IOS 12.0(5)S
Cisco IOS 12.0(4)T
Cisco IOS 12.0(3d)
Cisco IOS 12.0(3.4)T
Cisco IOS 12.0(3.3)S
Cisco IOS 12.0(3.2)
Cisco IOS 12.0(3)
Cisco IOS 12.0(2b)
Cisco IOS 12.0(26)S
Cisco IOS 12.0(26)
Cisco IOS 12.0(25.4)S1
Cisco IOS 12.0(25)S1
Cisco IOS 12.0(24.2)S
Cisco IOS 12.0(24)S2
Cisco IOS 12.0(24)S1
Cisco IOS 12.0(23)S3
Cisco IOS 12.0(23)S2
Cisco IOS 12.0(22)S5
Cisco IOS 12.0(22)S4
Cisco IOS 12.0(21a)
Cisco IOS 12.0(21)ST7
Cisco IOS 12.0(21)ST6
Cisco IOS 12.0(21)ST
Cisco IOS 12.0(21)S7
Cisco IOS 12.0(21)S6
Cisco IOS 12.0(21)S5a
Cisco IOS 12.0(21)S4a
Cisco IOS 12.0(21)S3
Cisco IOS 12.0(21)S1
Cisco IOS 12.0(21)S
Cisco IOS 12.0(20a)
Cisco IOS 12.0(20)ST7
Cisco IOS 12.0(20)ST6
Cisco IOS 12.0(20)ST2
Cisco IOS 12.0(19a)
Cisco IOS 12.0(19)ST6
Cisco IOS 12.0(19)ST2
Cisco IOS 12.0(19)ST
Cisco IOS 12.0(19)S4
Cisco IOS 12.0(19)S2a
Cisco IOS 12.0(19)S2
Cisco IOS 12.0(19)S
Cisco IOS 12.0(18b)
Cisco IOS 12.0(18)ST1
Cisco IOS 12.0(18)S7
Cisco IOS 12.0(18)S5a
Cisco IOS 12.0(18)S5
Cisco IOS 12.0(18)S
Cisco IOS 12.0(17a)
Cisco IOS 12.0(17)ST8
Cisco IOS 12.0(17)ST5
Cisco IOS 12.0(17)ST1
Cisco IOS 12.0(17)S7
Cisco IOS 12.0(17)S4
Cisco IOS 12.0(17)S
Cisco IOS 12.0(17)
Cisco IOS 12.0(16a)
Cisco IOS 12.0(16.06)S
Cisco IOS 12.0(16)ST1
Cisco IOS 12.0(16)ST
Cisco IOS 12.0(16)S8a
Cisco IOS 12.0(16)S8
Cisco IOS 12.0(16)S10
Cisco IOS 12.0(15a)
Cisco IOS 12.0(15)S7
Cisco IOS 12.0(15)S6
Cisco IOS 12.0(15)S3
Cisco IOS 12.0(14a)
Cisco IOS 12.0(14)ST3
Cisco IOS 12.0(14)ST
Cisco IOS 12.0(14)S8
Cisco IOS 12.0(14)S7
Cisco IOS 12.0(13a)
Cisco IOS 12.0(13)S8
Cisco IOS 12.0(13)S6
Cisco IOS 12.0(12a)
Cisco IOS 12.0(12)S4
Cisco IOS 12.0(12)S3
Cisco IOS 12.0(12)S3
Cisco IOS 12.0(11a)
Cisco IOS 12.0(11)ST4
Cisco IOS 12.0(10)S8
Cisco IOS 12.0(10)S7
Cisco IOS 12.0(10)S3b
Cisco IOS 12.0(1)ST
Cisco IOS 12.0(1)S
Cisco IOS 12.0
Cisco IOS 11.3XA
Cisco IOS 11.3WA4
Cisco IOS 11.3T
Cisco IOS 11.3NA
Cisco IOS 11.3MA
Cisco IOS 11.3HA
Cisco IOS 11.3DB
Cisco IOS 11.3DA
Cisco IOS 11.3AA
Cisco IOS 11.3(8)DB2
Cisco IOS 11.3(7)DB1
Cisco IOS 11.3(2)XA
Cisco IOS 11.3(11d)
Cisco IOS 11.3(11c)
Cisco IOS 11.3(11b)T2
Cisco IOS 11.3(11b)
Cisco IOS 11.3
Cisco Internet Service Node
Cisco Conference Connection
Cisco Call Manager 3.3 (3)
Cisco Call Manager 3.3
Cisco Call Manager 3.2
Cisco Call Manager 3.1 (3a)
Cisco Call Manager 3.1 (2)
Cisco Call Manager 3.1
Cisco Call Manager 3.0
Cisco BTS 10200
Cisco ATA-186
Check Point Software Nokia Voyager 4.1
Check Point Software NG-AI
Check Point Software Next Generation FP3 HF2
Check Point Software Next Generation FP3 HF1
Check Point Software Next Generation FP3
Check Point Software Next Generation FP2
Check Point Software Next Generation FP1
Check Point Software Firewall-1 [ VPN + DES ] 4.1
Check Point Software Firewall-1 [ VPN + DES + STRONG ] 4.1 SP2 Build 41716
Check Point Software Firewall-1 [ VPN + DES + STRONG ] 4.1 Build 41439
Check Point Software Firewall-1 4.1 SP6
Check Point Software Firewall-1 4.1 SP5
Check Point Software Firewall-1 4.1 SP4
Check Point Software Firewall-1 4.1 SP3
Check Point Software Firewall-1 4.1 SP2
Check Point Software Firewall-1 4.1 SP1
Check Point Software Firewall-1 4.1
Check Point Software Firewall-1 4.0 SP8
Check Point Software Firewall-1 4.0 SP7
Check Point Software Firewall-1 4.0 SP6
Check Point Software Firewall-1 4.0 SP5
Check Point Software Firewall-1 4.0 SP4
Check Point Software Firewall-1 4.0 SP3
Check Point Software Firewall-1 4.0 SP2
Check Point Software Firewall-1 4.0 SP1
Avaya SG5X 4.3
Avaya SG5X 4.2
Avaya SG5 4.3
Avaya SG5 4.2
Avaya SG208 0
Avaya SG203 4.31.29
Avaya Communication Manager 2.0
Avaya Communication Manager 1.3.1
Avaya Communication Manager 1.1
Cisco IOS 12.3(4)T1
Cisco IOS 12.3(4)T
Cisco IOS 12.3(3e)
Cisco IOS 12.3(2)T3
Cisco IOS 12.2(8)YW3
Cisco IOS 12.2(8)T10
Cisco IOS 12.2(4)YA8
Cisco IOS 12.2(4)YA7
Cisco IOS 12.2(4)T6
Cisco IOS 12.2(21a)
Cisco IOS 12.2(2)XB15
Cisco IOS 12.2(2)XB14
Cisco IOS 12.2(19)b
Cisco IOS 12.2(18)S
Cisco IOS 12.2(17d)
Cisco IOS 12.2(17a)SXA
Cisco IOS 12.2(17)
Cisco IOS 12.2(16f)
Cisco IOS 12.2(15)ZL1
Cisco IOS 12.2(15)ZJ3
Cisco IOS 12.2(15)ZJ2
Cisco IOS 12.2(15)T5
Cisco IOS 12.2(15)SL1
Cisco IOS 12.2(13e)
Cisco IOS 12.2(13)ZH3
Cisco IOS 12.2(13)ZC
Cisco IOS 12.2(11)T9
Cisco IOS 12.2(10g)
Cisco IOS 12.1(8b)E18
Cisco IOS 12.1(8b)E16
Cisco IOS 12.1(22)
Cisco IOS 12.1(20)E2
Cisco IOS 12.1(19)E6
Cisco IOS 12.1(14)E9
Cisco IOS 12.1(14)E10
Cisco IOS 12.1(13)E13
Cisco IOS 12.1(13)E12
Cisco IOS 12.1(11b)E14
Cisco IOS 12.0(28)
Cisco IOS 12.0(27)
Cisco IOS 12.0(26)S
Avaya Communication Manager 2.0.1
+ Avaya Communication Manager Server DEFINITY Server SI/CS
+ Avaya Communication Manager Server S8100
+ Avaya Communication Manager Server S8100
+ Avaya Communication Manager Server S8300
+ Avaya Communication Manager Server S8300
+ Avaya Communication Manager Server S8500
+ Avaya Communication Manager Server S8500
+ Avaya Communication Manager Server S8700
+ Avaya Communication Manager Server S8700

- 不受影响的程序版本

Cisco IOS 12.3(4)T1
Cisco IOS 12.3(4)T
Cisco IOS 12.3(3e)
Cisco IOS 12.3(2)T3
Cisco IOS 12.2(8)YW3
Cisco IOS 12.2(8)T10
Cisco IOS 12.2(4)YA8
Cisco IOS 12.2(4)YA7
Cisco IOS 12.2(4)T6
Cisco IOS 12.2(21a)
Cisco IOS 12.2(2)XB15
Cisco IOS 12.2(2)XB14
Cisco IOS 12.2(19)b
Cisco IOS 12.2(18)S
Cisco IOS 12.2(17d)
Cisco IOS 12.2(17a)SXA
Cisco IOS 12.2(17)
Cisco IOS 12.2(16f)
Cisco IOS 12.2(15)ZL1
Cisco IOS 12.2(15)ZJ3
Cisco IOS 12.2(15)ZJ2
Cisco IOS 12.2(15)T5
Cisco IOS 12.2(15)SL1
Cisco IOS 12.2(13e)
Cisco IOS 12.2(13)ZH3
Cisco IOS 12.2(13)ZC
Cisco IOS 12.2(11)T9
Cisco IOS 12.2(10g)
Cisco IOS 12.1(8b)E18
Cisco IOS 12.1(8b)E16
Cisco IOS 12.1(22)
Cisco IOS 12.1(20)E2
Cisco IOS 12.1(19)E6
Cisco IOS 12.1(14)E9
Cisco IOS 12.1(14)E10
Cisco IOS 12.1(13)E13
Cisco IOS 12.1(13)E12
Cisco IOS 12.1(11b)E14
Cisco IOS 12.0(28)
Cisco IOS 12.0(27)
Cisco IOS 12.0(26)S
Avaya Communication Manager 2.0.1
+ Avaya Communication Manager Server DEFINITY Server SI/CS
+ Avaya Communication Manager Server S8100
+ Avaya Communication Manager Server S8100
+ Avaya Communication Manager Server S8300
+ Avaya Communication Manager Server S8300
+ Avaya Communication Manager Server S8500
+ Avaya Communication Manager Server S8500
+ Avaya Communication Manager Server S8700
+ Avaya Communication Manager Server S8700

- 漏洞讨论

Multiple vendor implementations of the H.323 protocol contain various vulnerabilities; these may range from simple denial of service to potential arbitrary code execution.

- 漏洞利用

Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:vuldb@securityfocus.com.

- 解决方案

Fixes are available for these issues from some vendors, while others are still investigating whether their products are vulnerable. See the referenced advisory for vendor-specific details.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站