CVE-2005-1406
CVSS4.6
发布时间 :2005-05-06 00:00:00
修订时间 :2011-03-07 21:21:44
NMCOPS    

[原文]The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.


[CNNVD]Apple Mac OS X 多个本地安全漏洞(CNNVD-200505-933)

        Apple Mac OS X是苹果家族电脑所使用的操作系统。
        Apple发布了2005-10-31安全更新修复多个Mac OS X本地漏洞:
        - 误导性的文件所有权显示导致错误的安全认知;
         - 软件升级失败可能导致无法安装重要的安全修复;
         - 组成员更改漏洞导致非授权访问;
         - Keychain中存在信息泄漏漏洞。Keychain由于超时自动锁定后非授权用户可以浏览已显示的明文口令;
         - kernel中存在多个信息泄漏漏洞,可能允许本地用户访问敏感信息。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:freebsd:freebsd:4.2FreeBSD 4.2
cpe:/o:freebsd:freebsd:5.1FreeBSD 5.1
cpe:/o:freebsd:freebsd:4.4FreeBSD 4.4
cpe:/o:freebsd:freebsd:5.4FreeBSD 5.4
cpe:/o:freebsd:freebsd:5.3FreeBSD 5.3
cpe:/o:freebsd:freebsd:4.6FreeBSD 4.6
cpe:/o:freebsd:freebsd:4.8FreeBSD 4.8
cpe:/o:freebsd:freebsd:4.10FreeBSD 4.10
cpe:/o:freebsd:freebsd:5.2FreeBSD 5.2
cpe:/o:freebsd:freebsd:4.1FreeBSD 4.1
cpe:/o:freebsd:freebsd:4.11FreeBSD 4.11
cpe:/o:freebsd:freebsd:4.3FreeBSD 4.3
cpe:/o:freebsd:freebsd:4.5FreeBSD 4.5
cpe:/o:freebsd:freebsd:4.9FreeBSD 4.9
cpe:/o:freebsd:freebsd:4.7FreeBSD 4.7

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1406
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1406
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-933
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-05:08
http://www.vupen.com/english/advisories/2005/2256
(UNKNOWN)  VUPEN  ADV-2005-2256
http://www.securityfocus.com/bid/15252
(UNKNOWN)  BID  15252
http://www.securityfocus.com/bid/13526
(UNKNOWN)  BID  13526
http://secunia.com/advisories/17368
(UNKNOWN)  SECUNIA  17368
http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html
(UNKNOWN)  APPLE  APPLE-SA-2005-10-31

- 漏洞信息

Apple Mac OS X 多个本地安全漏洞
中危 设计错误
2005-05-06 00:00:00 2005-10-20 00:00:00
本地  
        Apple Mac OS X是苹果家族电脑所使用的操作系统。
        Apple发布了2005-10-31安全更新修复多个Mac OS X本地漏洞:
        - 误导性的文件所有权显示导致错误的安全认知;
         - 软件升级失败可能导致无法安装重要的安全修复;
         - 组成员更改漏洞导致非授权访问;
         - Keychain中存在信息泄漏漏洞。Keychain由于超时自动锁定后非授权用户可以浏览已显示的明文口令;
         - kernel中存在多个信息泄漏漏洞,可能允许本地用户访问敏感信息。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www.apple.com/support/downloads/

- 漏洞信息 (F41098)

Apple Security Advisory 2005-10-31 (PacketStormID:F41098)
2005-11-01 00:00:00
Apple  docs.info.apple.com
advisory,kernel
apple
CVE-2005-2749,CVE-2005-2750,CVE-2005-2751,CVE-2005-2739,CVE-2005-1126,CVE-2005-1406,CVE-2005-2752
[点击下载]

Flaws for Finder, Software Update, memberd, Keychain, and the kernel have all been addressed in this latest Apple update.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2005-10-31 Mac OS X v10.4.3

Mac OS X v10.4.3 and Mac OS X Server v10.4.3 are now available and
deliver the following security enhancements:

Finder
CVE-ID:  CVE-2005-2749
Available for:  Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact:  File ownership information may be misleading
Description:  Under certain situations, the file and group ownership
information displayed in the Finder Get Info window may not be
correct. This update addresses the issue by synchronizing the
displayed ownership with the actual ownership in all situations.
This issue does not affect systems prior to Mac OS X v10.4.

Software Update
CVE-ID:  CVE-2005-2750
Available for:  Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact:  Important Software Updates may not install
Description:  Software Update can be instructed by the user to
ignore specific updates. If all applicable updates have been marked
in this way, Software Update will exit without providing an an
opportunity to reset the status of these updates so that they may
be installed. This update addresses the issue by asking whether the
ignored updates list should be reset when this situation is
encountered. This issue does not affect systems prior to Mac OS X
v10.4.

memberd
CVE-ID:  CVE-2005-2751
Available for:  Mac OS X Server v10.4.2
Impact:  Changes to group membership are delayed for hours
Description:  In certain situations, changes to a group's membership
may not be immediately reflected in access control checks. This may
result in an authenticated user being able to access files or other
resources even after they have been removed from a group. This
update addresses the issue by invalidating the group membership
cache at appropriate times. This issue does not affect systems
prior to Mac OS X v10.4.

Keychain
CVE-ID:  CVE-2005-2739
Available for:  Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact:  Keychain Access will continue displaying plaintext
passwords after lock timeout
Description:  Keychain Access is a utility distributed with Mac OS X
that is used to view keychain items and change keychain settings.
If a keychain automatically locks due to a timeout while viewing a
password stored inside it, that password will remain visible. This
update patches Keychain Access so that passwords are hidden when
keychains lock. This issue does not affect systems prior to Mac OS
X v10.4. Credit to Eric Hall of DarkArt Consulting Services for
reporting this issue.

Kernel
CVE-ID:  CVE-2005-1126, CVE-2005-1406, CVE-2005-2752
Available for:  Mac OS X v10.4.2, Mac OS X Server v10.4.2
Impact:  Kernel memory may be disclosed to local users
Description:  Certain kernel interfaces may return data that
includes sensitive information in uninitialized memory. These
issues affect Mac OS X v10.4.2 and earlier. Credit to Ilja van
Sprundel and Neil Archibald of Suresec LTD, and Colin Percival of
the FreeBSD team for reporting these issues.

Mac OS X v10.4.3 may be obtained from the Software Update pane in
System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.4.2
The download file is named:  "MacOSXUpdate10.4.3.dmg"
Its SHA-1 digest is:  d5f641c111621705dd0da4ecdd733a1f47c576a3

For Mac OS X v10.4 and Mac OS X v10.4.1
The download file is named:  "MacOSXUpdateCombo10.4.3.dmg"
Its SHA-1 digest is:  1264c6c4583aa163a6e8465fbad7d0ff58b32086

For Mac OS X Server v10.4.2
The download file is named:  "MacOSXServerUpdate10.4.3.dmg"
Its SHA-1 digest is:  a2cea3387079e92618b02196e7683c85377d512f

For Mac OS X Server v10.4 and Mac OS X Server v10.4.1
The download file is named:  "MacOSXSrvrUpdCombo10.4.3.dmg"
Its SHA-1 digest is:  6dbc793d6613861d7e1954c477f11215db1bb569

Information will also be posted to the Apple Product Security
web site:  http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.2 (Build 2425)

iQEVAwUBQ2aaL4HaV5ucd/HdAQJ+Hgf/efHQVD9Kbi3pAwoZQna3jk5tp7kqFSfS
6/MgxTz8b8AhYQAReuKQpK4uQEc2Zy3lgWOLwaaPFcfX2wunKR3we27DSUK0Nmyz
KhHf0Rr7bAnDd8kcU6DnRQEQgKb2PNZ0D6Va5Q3/19e/wFE6hI2Tm3aW7vyKPiQo
KnstC0s6KT3J2bPeaXWEJH3RTqEa5ki1sO6gDejsO9Ym4niAvSNNYooa3f/afUYU
MQqgOuXSQqKiBWQiijMrJz5ytix1jTGplkr4pEppYnfqHxTtKGY5MjXmjfX8luM9
Dj3D+bRqVQHZ6YfY9f7fKx/5rRZDXxTViHCISPh6466QJzxf26GPvg==
=EDGT
-----END PGP SIGNATURE-----

    

- 漏洞信息 (F39102)

FreeBSD-SA-05-08.kmem.txt (PacketStormID:F39102)
2005-08-07 00:00:00
 
advisory,kernel
freebsd
CVE-2005-1406
[点击下载]

FreeBSD Security Advisory FreeBSD-SA-05:08 - In many parts of the FreeBSD kernel, names (of mount points, devices, files, etc.) are manipulated as NULL-terminated strings, but are provided to applications within fixed-length buffers.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=============================================================================
FreeBSD-SA-05:08.kmem                                       Security Advisory
                                                          The FreeBSD Project

Topic:          Local kernel memory disclosure

Category:       core
Module:         sys
Announced:      2005-05-06
Credits:        Christian S.J. Peron
Affects:        All FreeBSD releases prior to 5.4-RELEASE
Corrected:      2005-05-06 02:50:00 UTC (RELENG_5, 5.4-STABLE)
                2005-05-06 02:51:10 UTC (RELENG_5_4, 5.4-RELEASE)
                2005-05-06 02:50:35 UTC (RELENG_5_3, 5.3-RELEASE-p13)
                2005-05-06 02:48:46 UTC (RELENG_4, 4.11-STABLE)
                2005-05-06 02:49:35 UTC (RELENG_4_11, 4.11-RELEASE-p7)
                2005-05-06 02:49:08 UTC (RELENG_4_10, 4.10-RELEASE-p12)
CVE Name:       CAN-2005-1406

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
<URL:http://www.freebsd.org/security/>.

I.   Background

In many parts of the FreeBSD kernel, names (of mount points, devices,
files, etc.) are manipulated as NULL-terminated strings, but are provided
to applications within fixed-length buffers.

II.  Problem Description

In several places, variable-length strings were copied into fixed-length
buffers without zeroing the unused portion of the buffer.

III. Impact

The previous contents of part of the fixed-length buffers will be
disclosed to applications.  Such memory might contain sensitive
information, such as portions of the file cache or terminal buffers.
This information might be directly useful, or it might be leveraged to
obtain elevated privileges in some way.  For example, a terminal buffer
might include a user-entered password.

IV.  Workaround

No workaround is available.

V.   Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the
RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch dated after
the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.10,
4.11, and 5.3 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 4.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:08/kmem4.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:08/kmem4.patch.asc

[FreeBSD 5.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:08/kmem5.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:08/kmem5.patch.asc

b) Apply the patch.

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
system.

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Branch                                                           Revision
  Path
- -------------------------------------------------------------------------
RELENG_4
  src/sys/kern/vfs_subr.c                                      1.249.2.32
  src/sys/net/if_mib.c                                            1.8.2.3
  src/sys/netinet/ip_divert.c                                    1.42.2.8
  src/sys/netinet/raw_ip.c                                      1.64.2.20
  src/sys/netinet/udp_usrreq.c                                  1.64.2.20
RELENG_4_11
  src/UPDATING                                              1.72.2.91.2.8
  src/sys/conf/newvers.sh                                  1.44.2.39.2.11
  src/sys/kern/vfs_subr.c                                  1.249.2.31.6.1
  src/sys/net/if_mib.c                                        1.8.2.2.2.1
  src/sys/netinet/ip_divert.c                                1.42.2.7.2.1
  src/sys/netinet/raw_ip.c                                  1.64.2.19.2.1
  src/sys/netinet/udp_usrreq.c                              1.64.2.19.6.1
RELENG_4_10
  src/UPDATING                                             1.73.2.90.2.13
  src/sys/conf/newvers.sh                                  1.44.2.34.2.14
  src/sys/kern/vfs_subr.c                                  1.249.2.31.4.1
  src/sys/net/if_mib.c                                       1.8.2.1.16.2
  src/sys/netinet/ip_divert.c                                1.42.2.6.6.1
  src/sys/netinet/raw_ip.c                                  1.64.2.18.4.1
  src/sys/netinet/udp_usrreq.c                              1.64.2.19.4.1
RELENG_5
  src/sys/kern/subr_bus.c                                       1.156.2.7
  src/sys/kern/vfs_subr.c                                       1.522.2.5
  src/sys/net/if_mib.c                                           1.13.4.2
  src/sys/netinet/ip_divert.c                                    1.98.2.3
  src/sys/netinet/raw_ip.c                                      1.142.2.5
  src/sys/netinet/udp_usrreq.c                                  1.162.2.8
RELENG_5_4
  src/UPDATING                                             1.342.2.24.2.7
  src/sys/kern/subr_bus.c                                   1.156.2.5.2.1
  src/sys/kern/vfs_subr.c                                   1.522.2.4.2.1
  src/sys/net/if_mib.c                                       1.13.4.1.2.1
  src/sys/netinet/ip_divert.c                                1.98.2.2.2.1
  src/sys/netinet/raw_ip.c                                  1.142.2.4.2.1
  src/sys/netinet/udp_usrreq.c                              1.162.2.7.2.1
RELENG_5_3
  src/UPDATING                                            1.342.2.13.2.16
  src/sys/conf/newvers.sh                                  1.62.2.15.2.18
  src/sys/kern/subr_bus.c                                   1.156.2.2.2.1
  src/sys/kern/vfs_subr.c                                   1.522.2.1.2.1
  src/sys/net/if_mib.c                                           1.13.6.1
  src/sys/netinet/ip_divert.c                                    1.98.4.1
  src/sys/netinet/raw_ip.c                                  1.142.2.2.2.1
  src/sys/netinet/udp_usrreq.c                              1.162.2.3.2.1
- -------------------------------------------------------------------------

The latest revision of this advisory is available at
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFCet0HFdaIBMps37IRAvxIAJ9iM61VUlJNE8x/yNjjiSJkb3KZ3QCgnbIm
SnJAg6SOw/yfRDHoxiKwRIM=
=yN6p
-----END PGP SIGNATURE-----
    

- 漏洞信息

16091
FreeBSD Kernel Arbitrary Memory Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality

- 漏洞描述

FreeBSD contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the kernel copies variable-length strings into fixed-length buffers without zeroing the unused portion of the buffer. This can allow a malicious user to obtain sensitive information, such as portions of the file cache or terminal buffers, resulting in a loss of confidentiality.

- 时间线

2005-05-06 Unknow
Unknow Unknow

- 解决方案

Upgrade to 4-STABLE or 5-STABLE, or to the RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch dated after the correction date, as it has been reported to fix this vulnerability. In addition, FreeBSD has released a patch for some older versions.

- 相关参考

- 漏洞作者

- 漏洞信息

FreeBSD Multiple Local Kernel Memory Disclosure Vulnerabilities
Design Error 13526
No Yes
2005-05-06 12:00:00 2009-07-12 02:06:00
The vendor disclosed these vulnerabilities.

- 受影响的程序版本

FreeBSD FreeBSD 5.4 -PRERELEASE
FreeBSD FreeBSD 5.3 -STABLE
FreeBSD FreeBSD 5.3 -RELENG
FreeBSD FreeBSD 5.3 -RELEASE
FreeBSD FreeBSD 5.3
FreeBSD FreeBSD 5.2.1 -RELEASE
FreeBSD FreeBSD 5.2 -RELENG
FreeBSD FreeBSD 5.2 -RELEASE
FreeBSD FreeBSD 5.2
FreeBSD FreeBSD 5.1 -RELENG
FreeBSD FreeBSD 5.1 -RELEASE/Alpha
FreeBSD FreeBSD 5.1 -RELEASE-p5
FreeBSD FreeBSD 5.1 -RELEASE
FreeBSD FreeBSD 5.1
FreeBSD FreeBSD 5.0 -RELENG
FreeBSD FreeBSD 5.0 -RELEASE-p14
FreeBSD FreeBSD 5.0 alpha
FreeBSD FreeBSD 5.0
FreeBSD FreeBSD 4.11 -STABLE
FreeBSD FreeBSD 4.11 -RELENG
FreeBSD FreeBSD 4.11 -RELEASE-p3
FreeBSD FreeBSD 4.10 -RELENG
FreeBSD FreeBSD 4.10 -RELEASE-p8
FreeBSD FreeBSD 4.10 -RELEASE
FreeBSD FreeBSD 4.10
FreeBSD FreeBSD 4.9 -RELENG
FreeBSD FreeBSD 4.9 -PRERELEASE
FreeBSD FreeBSD 4.9
FreeBSD FreeBSD 4.8 -RELENG
FreeBSD FreeBSD 4.8 -RELEASE-p7
FreeBSD FreeBSD 4.8 -PRERELEASE
FreeBSD FreeBSD 4.8
FreeBSD FreeBSD 4.7 -STABLE
FreeBSD FreeBSD 4.7 -RELENG
FreeBSD FreeBSD 4.7 -RELEASE-p17
FreeBSD FreeBSD 4.7 -RELEASE
FreeBSD FreeBSD 4.7
FreeBSD FreeBSD 4.6.2
FreeBSD FreeBSD 4.6 -STABLE
FreeBSD FreeBSD 4.6 -RELENG
FreeBSD FreeBSD 4.6 -RELEASE-p20
FreeBSD FreeBSD 4.6 -RELEASE
FreeBSD FreeBSD 4.6
FreeBSD FreeBSD 4.5 -STABLEpre2002-03-07
FreeBSD FreeBSD 4.5 -STABLE
FreeBSD FreeBSD 4.5 -RELENG
FreeBSD FreeBSD 4.5 -RELEASE-p32
FreeBSD FreeBSD 4.5 -RELEASE
FreeBSD FreeBSD 4.5
FreeBSD FreeBSD 4.4 -STABLE
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELENG
FreeBSD FreeBSD 4.4 -RELEASE-p42
FreeBSD FreeBSD 4.4
FreeBSD FreeBSD 4.3 -STABLE
FreeBSD FreeBSD 4.3 -RELENG
FreeBSD FreeBSD 4.3 -RELEASE-p38
FreeBSD FreeBSD 4.3 -RELEASE
FreeBSD FreeBSD 4.3
FreeBSD FreeBSD 4.2 -STABLEpre122300
FreeBSD FreeBSD 4.2 -STABLEpre050201
FreeBSD FreeBSD 4.2 -STABLE
FreeBSD FreeBSD 4.2 -RELEASE
FreeBSD FreeBSD 4.2
FreeBSD FreeBSD 4.1.1 -STABLE
FreeBSD FreeBSD 4.1.1 -RELEASE
FreeBSD FreeBSD 4.1.1
FreeBSD FreeBSD 4.1
FreeBSD FreeBSD 4.0 .x
FreeBSD FreeBSD 4.0 -RELENG
FreeBSD FreeBSD 4.0 alpha
FreeBSD FreeBSD 4.0
FreeBSD FreeBSD 5.4 -RELEASE

- 不受影响的程序版本

FreeBSD FreeBSD 5.4 -RELEASE

- 漏洞讨论

FreeBSD is prone to multiple local kernel memory disclosure vulnerabilities. These issues are due to a failure of the kernel to properly clear previously used memory buffers prior to copying these buffers to user-space.

These vulnerabilities allow local attackers to gain access to potentially sensitive kernel memory. Access to this data may aid the malicious users in further attacks.

Versions of FreeBSD prior to 5.4-RELEASE are reported vulnerable to this issue.

- 漏洞利用

An exploit is not required.

- 解决方案

FreeBSD has released advisory FreeBSD-SA-05:08.kmem to address these issues. Please see the referenced advisory for further information.


FreeBSD FreeBSD 4.0

FreeBSD FreeBSD 4.0 -RELENG

FreeBSD FreeBSD 4.0 .x

FreeBSD FreeBSD 4.0 alpha

FreeBSD FreeBSD 4.1

FreeBSD FreeBSD 4.1.1 -STABLE

FreeBSD FreeBSD 4.1.1 -RELEASE

FreeBSD FreeBSD 4.1.1

FreeBSD FreeBSD 4.10 -RELEASE-p8

FreeBSD FreeBSD 4.10 -RELEASE

FreeBSD FreeBSD 4.10 -RELENG

FreeBSD FreeBSD 4.10

FreeBSD FreeBSD 4.11 -RELEASE-p3

FreeBSD FreeBSD 4.11 -RELENG

FreeBSD FreeBSD 4.11 -STABLE

FreeBSD FreeBSD 4.2

FreeBSD FreeBSD 4.2 -RELEASE

FreeBSD FreeBSD 4.2 -STABLEpre122300

FreeBSD FreeBSD 4.2 -STABLEpre050201

FreeBSD FreeBSD 4.2 -STABLE

FreeBSD FreeBSD 4.3 -STABLE

FreeBSD FreeBSD 4.3 -RELEASE-p38

FreeBSD FreeBSD 4.3

FreeBSD FreeBSD 4.3 -RELEASE

FreeBSD FreeBSD 4.3 -RELENG

FreeBSD FreeBSD 4.4 -RELENG

FreeBSD FreeBSD 4.4 -RELEASE-p42

FreeBSD FreeBSD 4.4

FreeBSD FreeBSD 4.4 -STABLE

FreeBSD FreeBSD 4.4 -RELENG

FreeBSD FreeBSD 4.5 -RELEASE-p32

FreeBSD FreeBSD 4.5

FreeBSD FreeBSD 4.5 -STABLEpre2002-03-07

FreeBSD FreeBSD 4.5 -STABLE

FreeBSD FreeBSD 4.5 -RELEASE

FreeBSD FreeBSD 4.5 -RELENG

FreeBSD FreeBSD 4.6 -RELEASE-p20

FreeBSD FreeBSD 4.6 -RELENG

FreeBSD FreeBSD 4.6 -RELEASE

FreeBSD FreeBSD 4.6 -STABLE

FreeBSD FreeBSD 4.6

FreeBSD FreeBSD 4.6.2

FreeBSD FreeBSD 4.7 -RELEASE-p17

FreeBSD FreeBSD 4.7 -RELENG

FreeBSD FreeBSD 4.7 -RELEASE

FreeBSD FreeBSD 4.7

FreeBSD FreeBSD 4.7 -STABLE

FreeBSD FreeBSD 4.8 -RELENG

FreeBSD FreeBSD 4.8 -PRERELEASE

FreeBSD FreeBSD 4.8 -RELEASE-p7

FreeBSD FreeBSD 4.8

FreeBSD FreeBSD 4.9

FreeBSD FreeBSD 4.9 -PRERELEASE

FreeBSD FreeBSD 4.9 -RELENG

FreeBSD FreeBSD 5.0

FreeBSD FreeBSD 5.0 alpha

FreeBSD FreeBSD 5.0 -RELENG

FreeBSD FreeBSD 5.0 -RELEASE-p14

FreeBSD FreeBSD 5.1 -RELEASE/Alpha

FreeBSD FreeBSD 5.1

FreeBSD FreeBSD 5.1 -RELENG

FreeBSD FreeBSD 5.1 -RELEASE

FreeBSD FreeBSD 5.1 -RELEASE-p5

FreeBSD FreeBSD 5.2 -RELEASE

FreeBSD FreeBSD 5.2

FreeBSD FreeBSD 5.2 -RELENG

FreeBSD FreeBSD 5.2.1 -RELEASE

FreeBSD FreeBSD 5.3

FreeBSD FreeBSD 5.3 -RELEASE

FreeBSD FreeBSD 5.3 -RELENG

FreeBSD FreeBSD 5.3 -STABLE

FreeBSD FreeBSD 5.4 -PRERELEASE

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站