CVE-2004-0778
CVSS5.0
发布时间 :2004-10-20 00:00:00
修订时间 :2010-08-21 00:21:15
NMCOPS    

[原文]CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories via the -X command for an alternate history file, which causes different error messages to be returned.


[CNNVD]CVS未文档化标记信息泄露漏洞(CNNVD-200410-048)

        
        Concurrent Versions System (CVS)是一款开放源代码的版本控制软件。
        CVS存在未文档化命令参数开关标记,远程攻击者可以利用这个漏洞获得敏感信息。
        问题存在于src/history.c文件中的'history'命令的未公开开关,-X命令选项指定历史文件名,允许攻击者判断任意系统文件或目录是否存在,或者CVS进程是否能访问它们。可导致敏感信息泄露。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cvs:cvs:1.11.1_p1
cpe:/a:cvs:cvs:1.11.11
cpe:/a:cvs:cvs:1.11.14
cpe:/a:cvs:cvs:1.11
cpe:/a:cvs:cvs:1.11.10
cpe:/a:cvs:cvs:1.11.2
cpe:/a:cvs:cvs:1.12.2
cpe:/a:cvs:cvs:1.11.4
cpe:/a:cvs:cvs:1.11.16
cpe:/a:cvs:cvs:1.12.1
cpe:/a:cvs:cvs:1.11.6
cpe:/a:cvs:cvs:1.11.15
cpe:/a:cvs:cvs:1.10.6
cpe:/a:cvs:cvs:1.10.8
cpe:/a:cvs:cvs:1.12.5
cpe:/a:cvs:cvs:1.10.7
cpe:/a:cvs:cvs:1.12.7
cpe:/a:cvs:cvs:1.11.5
cpe:/a:cvs:cvs:1.11.1
cpe:/a:cvs:cvs:1.11.3
cpe:/a:cvs:cvs:1.12.8

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10688CVS 1.11.x before 1.11.17, and 1.12.x before 1.12.9, allows remote attackers to determine the existence of arbitrary files and directories v...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0778
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0778
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200410-048
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/579225
(VENDOR_ADVISORY)  CERT-VN  VU#579225
http://xforce.iss.net/xforce/xfdb/17001
(VENDOR_ADVISORY)  XF  cvs-history-info-disclosure(17001)
http://www.securityfocus.com/bid/10955
(VENDOR_ADVISORY)  BID  10955
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:108
(UNKNOWN)  MANDRAKE  MDKSA-2004:108
http://www.idefense.com/application/poi/display?id=130&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20040816 CVS Undocumented Flag Information Disclosure Vulnerability

- 漏洞信息

CVS未文档化标记信息泄露漏洞
中危 输入验证
2004-10-20 00:00:00 2005-10-20 00:00:00
远程  
        
        Concurrent Versions System (CVS)是一款开放源代码的版本控制软件。
        CVS存在未文档化命令参数开关标记,远程攻击者可以利用这个漏洞获得敏感信息。
        问题存在于src/history.c文件中的'history'命令的未公开开关,-X命令选项指定历史文件名,允许攻击者判断任意系统文件或目录是否存在,或者CVS进程是否能访问它们。可导致敏感信息泄露。
        

- 公告与补丁

        厂商补丁:
        CVS
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载CVS 1.11.17 & 1.12.9版本:
        
        http://www.cvshome.org/

- 漏洞信息 (F34072)

iDEFENSE Security Advisory 2004-08-16.t (PacketStormID:F34072)
2004-08-18 00:00:00
iDefense Labs  idefense.com
advisory,remote,arbitrary,info disclosure
CVE-2004-0778
[点击下载]

iDEFENSE Security Advisory 08.16.04: Remote exploitation of an information disclosure vulnerability in Concurrent Versions Systems (CVS) allows attackers to glean information. The vulnerability exists within an undocumented switch to the history command implemented in src/history.c. The -X command specifies the name of the history file allowing an attacker to determine whether arbitrary system files and directories exist and whether or not the CVS process has access to them. This issue was patched in the latest (June 9th) releases of CVS, specifically 1.11.17 and 1.12.9.

CVS Undocumented Flag Information Disclosure Vulnerability

iDEFENSE Security Advisory 08.16.04:

*I. BACKGROUND*

CVS (Concurrent Versions System) is an open-source network-transparent
version control system.

*II. DESCRIPTION*

Remote exploitation of an information disclosure vulnerability in
Concurrent Versions Systems (CVS) allows attackers to glean information.
The vulnerability exists within an undocumented switch to the 'history'
command implemented in src/history.c. The -X command specifies the name
of the history file allowing an attacker to determine whether arbitrary
system files and directories exist and whether or not the CVS process
has access to them. The following output from iDEFENSE's proof of
concept code demonstrates the impact of this vulnerability:

The file /etc/shells exists and is readable by the CVS daemon:

    $ ./cvsfiler 172.16.60.200 2401 cvs cvspass /var/cvs /etc/shells
    Connected to server.
    E cvs server: warning: history line 1 invalid
    E cvs server: warning: history line 2 invalid
    ...
    E cvs server: warning: history line 7 invalid
    M No records selected.
    ok

The file /usr/bin/password exists and is not readable by the CVS daemon:

    $ ./cvsfiler 172.16.60.200 2401 cvs cvspass /var/cvs /usr/bin/passwd
    Connected to server.
    E cvs [server aborted]: cannot open history file: /usr/bin/passwd:
    Permission denied
    error

The file /etc/foo does not exist.

    $ ./cvsfiler 172.16.60.200 2401 cvs cvspass /var/cvs /etc/foo \
        Connected to server.
    E cvs [server aborted]: cannot open history file: /etc/foo: No \
        such file or directory
    error

/tmp is a directory.

    $ ./cvsfiler 172.16.60.200 2401 cvs cvspass /var/cvs /tmp
    Connected to server.
    E cvs [server aborted]: error reading history file: Is a directory
    error

*III. ANALYSIS*

Successful exploitation allows remote attackers with credentials to the
affected CVS server to determine whether or not arbitrary system files
and directories exist and are accessible under the permissions of the
user that the CVS daemon runs under.

*IV. DETECTION*

iDEFENSE has confirmed the existence of this vulnerability in CVS
version 1.11. Earlier versions are suspected as being vulnerable as
well.

*V. VENDOR RESPONSE*

This issue was patched in the latest (June 9th) releases of CVS,
specifically 1.11.17 & 1.12.9.

*VI. CVE INFORMATION*

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2004-0778 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org <http://cve.mitre.org/>), which
standardizes names for
security problems.

*VII. DISCLOSURE TIMELINE*

07/22/2004   Initial vendor notification
07/22/2004   iDEFENSE clients notified
08/05/2004   Initial vendor response
08/16/2004   Public Disclosure

*VIII. CREDIT*

An anonymous contributor is credited with discovering this
vulnerability.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

*VI. LEGAL NOTICES*

Copyright     

- 漏洞信息

8977
CVS history.c File Existence Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality

- 漏洞描述

CVS contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker utilizes the undocumented -X command ('history'), which will disclose existence and CVS user account permissions for requested file or directories resulting in a loss of confidentiality.

- 时间线

2004-08-16 2004-07-22
Unknow Unknow

- 解决方案

Upgrade to version 1.12.9 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

CVS Undocumented History Flag Information Disclosure Vulnerability
Input Validation Error 10955
Yes No
2004-06-09 12:00:00 2009-07-12 06:16:00
Sebastian Krahmer discovered this vulnerability.

- 受影响的程序版本

FreeBSD FreeBSD 5.2.1 -RELEASE
FreeBSD FreeBSD 5.2 -RELENG
FreeBSD FreeBSD 5.2 -RELEASE
FreeBSD FreeBSD 5.2
FreeBSD FreeBSD 5.1 -RELENG
FreeBSD FreeBSD 5.1 -RELEASE/Alpha
FreeBSD FreeBSD 5.1 -RELEASE-p5
FreeBSD FreeBSD 5.1 -RELEASE
FreeBSD FreeBSD 5.1
FreeBSD FreeBSD 5.0 -RELENG
FreeBSD FreeBSD 5.0 -RELEASE-p14
FreeBSD FreeBSD 5.0 alpha
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 4.10 -RELENG
FreeBSD FreeBSD 4.10 -RELEASE
FreeBSD FreeBSD 4.10
FreeBSD FreeBSD 4.9 -RELENG
FreeBSD FreeBSD 4.9 -PRERELEASE
FreeBSD FreeBSD 4.9
FreeBSD FreeBSD 4.8 -RELENG
FreeBSD FreeBSD 4.8 -RELEASE-p7
FreeBSD FreeBSD 4.8 -PRERELEASE
FreeBSD FreeBSD 4.8
FreeBSD FreeBSD 4.7 -STABLE
FreeBSD FreeBSD 4.7 -RELENG
FreeBSD FreeBSD 4.7 -RELEASE-p17
FreeBSD FreeBSD 4.7 -RELEASE
FreeBSD FreeBSD 4.7
FreeBSD FreeBSD 4.6.2
FreeBSD FreeBSD 4.6 -STABLE
FreeBSD FreeBSD 4.6 -RELENG
FreeBSD FreeBSD 4.6 -RELEASE-p20
FreeBSD FreeBSD 4.6 -RELEASE
FreeBSD FreeBSD 4.6
FreeBSD FreeBSD 4.5 -STABLEpre2002-03-07
FreeBSD FreeBSD 4.5 -STABLE
FreeBSD FreeBSD 4.5 -RELENG
FreeBSD FreeBSD 4.5 -RELEASE-p32
FreeBSD FreeBSD 4.5 -RELEASE
FreeBSD FreeBSD 4.5
FreeBSD FreeBSD 4.4 -STABLE
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELEASE-p42
FreeBSD FreeBSD 4.4
FreeBSD FreeBSD 4.3 -STABLE
FreeBSD FreeBSD 4.3 -RELENG
FreeBSD FreeBSD 4.3 -RELEASE-p38
FreeBSD FreeBSD 4.3 -RELEASE
FreeBSD FreeBSD 4.3
FreeBSD FreeBSD 4.2 -STABLEpre122300
FreeBSD FreeBSD 4.2 -STABLEpre050201
FreeBSD FreeBSD 4.2 -STABLE
FreeBSD FreeBSD 4.2 -RELEASE
FreeBSD FreeBSD 4.2
FreeBSD FreeBSD 4.1.1 -STABLE
FreeBSD FreeBSD 4.1.1 -RELEASE
FreeBSD FreeBSD 4.1.1
FreeBSD FreeBSD 4.1
FreeBSD FreeBSD 4.0 .x
FreeBSD FreeBSD 4.0 -RELENG
FreeBSD FreeBSD 4.0 alpha
FreeBSD FreeBSD 4.0
FreeBSD FreeBSD 3.5.1 -STABLEpre2001-07-20
FreeBSD FreeBSD 3.5.1 -STABLE
FreeBSD FreeBSD 3.5.1 -RELEASE
FreeBSD FreeBSD 3.5.1
FreeBSD FreeBSD 3.5 x
FreeBSD FreeBSD 3.5 -STABLEpre122300
FreeBSD FreeBSD 3.5 -STABLEpre050201
FreeBSD FreeBSD 3.5 -STABLE
FreeBSD FreeBSD 3.5
FreeBSD FreeBSD 3.4 x
FreeBSD FreeBSD 3.4
FreeBSD FreeBSD 3.3 x
FreeBSD FreeBSD 3.3
FreeBSD FreeBSD 3.2 x
FreeBSD FreeBSD 3.2
FreeBSD FreeBSD 3.1 x
FreeBSD FreeBSD 3.1
FreeBSD FreeBSD 3.0 -RELENG
FreeBSD FreeBSD 3.0
FreeBSD FreeBSD 2.2.8
FreeBSD FreeBSD 2.2.6
FreeBSD FreeBSD 2.2.5
FreeBSD FreeBSD 2.2.4
FreeBSD FreeBSD 2.2.3
FreeBSD FreeBSD 2.2.2
FreeBSD FreeBSD 2.2 x
FreeBSD FreeBSD 2.2
FreeBSD FreeBSD 2.1.7 .1
FreeBSD FreeBSD 2.1.6 .1
FreeBSD FreeBSD 2.1.6
FreeBSD FreeBSD 2.1.5
FreeBSD FreeBSD 2.1 x
FreeBSD FreeBSD 2.1
FreeBSD FreeBSD 2.0.5
FreeBSD FreeBSD 2.0
FreeBSD FreeBSD 1.1.5 .1
FreeBSD FreeBSD 4.10-PRERELEASE
CVS CVS 1.12.8
CVS CVS 1.12.7
CVS CVS 1.12.5
+ OpenPKG OpenPKG 2.0
CVS CVS 1.12.2
+ OpenPKG OpenPKG Current
CVS CVS 1.12.1
+ OpenPKG OpenPKG 1.3
CVS CVS 1.11.16
CVS CVS 1.11.15
CVS CVS 1.11.14
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ Mandriva Linux Mandrake 10.0
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
CVS CVS 1.11.11
CVS CVS 1.11.10
CVS CVS 1.11.6
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
CVS CVS 1.11.5
+ OpenPKG OpenPKG 1.2
+ S.u.S.E. Linux Personal 8.2
CVS CVS 1.11.4
CVS CVS 1.11.3
CVS CVS 1.11.2
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ Slackware Linux 8.1
CVS CVS 1.11.1 p1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ OpenBSD OpenBSD 3.5
+ OpenBSD OpenBSD 3.4
+ OpenBSD OpenBSD 3.3
+ OpenBSD OpenBSD 3.2
+ OpenBSD OpenBSD 3.1
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ Wirex Immunix OS 7.0
+ Wirex Immunix OS 7+
CVS CVS 1.11.1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
CVS CVS 1.11
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
CVS CVS 1.10.8
CVS CVS 1.10.7
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
CVS CVS 1.10.6
CVS CVS 1.12.9
+ Trustix Secure Linux 2.2
CVS CVS 1.11.17
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Red Hat Fedora Core3

- 不受影响的程序版本

CVS CVS 1.12.9
+ Trustix Secure Linux 2.2
CVS CVS 1.11.17
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Red Hat Fedora Core3

- 漏洞讨论

CVS is reported prone to an information disclosure vulnerability in an undocumented 'history' command flag.

This vulnerability presents itself when a remote attacker connects to a CVS pserver via TCP. An attacker may utilize the history command to issue requests that will return information about files readable by the CVS server process.

This vulnerability may aid an attacker in further compromise of the server.

Versions of CVS prior to 1.11.17 and prior to 1.12.9 are reportedly vulnerable.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released versions 1.11.17 and 1.12.9 addressing this and other issues. Users of affected packages are urged to upgrade.

FreeBSD has released advisory FreeBSD-SA-04:14 addressing this issue. Please see the referenced advisory for further information on patches and fixes.

A Fedora legacy advisory is available that addresses various issues affecting cvs. This advisory contains fixes for the Red Hat Linux 7.3 and 9.0 operating systems running the i386 platform. Please see the referenced advisory to obtain more information.

MandrakeSoft has issued fixes fro Mandrake Linux. Please see referenced advisory for more details.


FreeBSD FreeBSD 4.10-PRERELEASE

CVS CVS 1.11

CVS CVS 1.11.1 p1

CVS CVS 1.11.1

CVS CVS 1.11.11

CVS CVS 1.11.14

CVS CVS 1.11.15

CVS CVS 1.11.2

CVS CVS 1.11.5

CVS CVS 1.11.6

CVS CVS 1.12.1

CVS CVS 1.12.2

CVS CVS 1.12.5

CVS CVS 1.12.7

FreeBSD FreeBSD 2.0

FreeBSD FreeBSD 2.0.5

FreeBSD FreeBSD 2.1

FreeBSD FreeBSD 2.1 x

FreeBSD FreeBSD 2.1.5

FreeBSD FreeBSD 2.1.6 .1

FreeBSD FreeBSD 2.1.6

FreeBSD FreeBSD 2.1.7 .1

FreeBSD FreeBSD 2.2

FreeBSD FreeBSD 2.2 x

FreeBSD FreeBSD 2.2.2

FreeBSD FreeBSD 2.2.3

FreeBSD FreeBSD 2.2.4

FreeBSD FreeBSD 2.2.5

FreeBSD FreeBSD 2.2.6

FreeBSD FreeBSD 2.2.8

FreeBSD FreeBSD 3.0 -RELENG

FreeBSD FreeBSD 3.0

FreeBSD FreeBSD 3.1

FreeBSD FreeBSD 3.2 x

FreeBSD FreeBSD 3.3

FreeBSD FreeBSD 3.4

FreeBSD FreeBSD 3.4 x

FreeBSD FreeBSD 3.5 x

FreeBSD FreeBSD 3.5

FreeBSD FreeBSD 3.5 -STABLEpre050201

FreeBSD FreeBSD 3.5.1 -STABLE

FreeBSD FreeBSD 3.5.1 -STABLEpre2001-07-20

FreeBSD FreeBSD 3.5.1 -RELEASE

FreeBSD FreeBSD 3.5.1

FreeBSD FreeBSD 4.0

FreeBSD FreeBSD 4.0 -RELENG

FreeBSD FreeBSD 4.0 .x

FreeBSD FreeBSD 4.0 alpha

FreeBSD FreeBSD 4.1

FreeBSD FreeBSD 4.1.1 -STABLE

FreeBSD FreeBSD 4.1.1 -RELEASE

FreeBSD FreeBSD 4.10 -RELEASE

FreeBSD FreeBSD 4.10 -RELENG

FreeBSD FreeBSD 4.2

FreeBSD FreeBSD 4.3 -STABLE

FreeBSD FreeBSD 4.3 -RELEASE-p38

FreeBSD FreeBSD 4.3

FreeBSD FreeBSD 4.4 -RELENG

FreeBSD FreeBSD 4.4 -RELEASE-p42

FreeBSD FreeBSD 4.4

FreeBSD FreeBSD 4.5 -RELEASE-p32

FreeBSD FreeBSD 4.5

FreeBSD FreeBSD 4.5 -STABLEpre2002-03-07

FreeBSD FreeBSD 4.5 -STABLE

FreeBSD FreeBSD 4.5 -RELEASE

FreeBSD FreeBSD 4.6 -RELEASE-p20

FreeBSD FreeBSD 4.6 -RELENG

FreeBSD FreeBSD 4.6 -RELEASE

FreeBSD FreeBSD 4.6 -STABLE

FreeBSD FreeBSD 4.6

FreeBSD FreeBSD 4.6.2

FreeBSD FreeBSD 4.7 -RELEASE-p17

FreeBSD FreeBSD 4.7 -RELENG

FreeBSD FreeBSD 4.7 -RELEASE

FreeBSD FreeBSD 4.7

FreeBSD FreeBSD 4.8 -RELENG

FreeBSD FreeBSD 4.8 -PRERELEASE

FreeBSD FreeBSD 4.8 -RELEASE-p7

FreeBSD FreeBSD 4.8

FreeBSD FreeBSD 4.9

FreeBSD FreeBSD 4.9 -PRERELEASE

FreeBSD FreeBSD 5.0 alpha

FreeBSD FreeBSD 5.0

FreeBSD FreeBSD 5.0 -RELENG

FreeBSD FreeBSD 5.0 -RELEASE-p14

FreeBSD FreeBSD 5.1 -RELEASE/Alpha

FreeBSD FreeBSD 5.1

FreeBSD FreeBSD 5.1 -RELENG

FreeBSD FreeBSD 5.2 -RELEASE

FreeBSD FreeBSD 5.2

FreeBSD FreeBSD 5.2 -RELENG

FreeBSD FreeBSD 5.2.1 -RELEASE

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站