CVE-2005-3625
Published Dec 31, 2005
Last updated 6 years ago
Overview
- Description
- Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97" }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7" }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C116493B-2837-4531-9291-A9FF03099A97" }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "525BD04B-387F-4713-BC89-472D0D0BCFD0" }, { "criteria": "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BF92649-90CE-4E75-A938-61D0916B5A7E" }, { "criteria": "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8" }, { "criteria": "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37C08E0A-651F-458B-BCEC-A30DCD527E47" }, { "criteria": "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6000D6AF-C056-4BC0-A54C-72E23E52AB92" }, { "criteria": "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7D036E4-FA49-417D-968B-9D73B16A09BA" }, { "criteria": "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B" }, { "criteria": "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC" }, { "criteria": "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295" }, { "criteria": "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "679D9520-DE8E-4D06-A227-3B1C1D05977D" }, { "criteria": "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6" }, { "criteria": "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486" }, { "criteria": "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C86C7D6F-C39E-4403-86C6-F87599570E97" }, { "criteria": "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "236005A1-C175-44D3-8D0C-C48F943F3D66" }, { "criteria": "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AF2AD80-5E65-4B57-933B-C395E98EF10D" }, { "criteria": "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07C92A0E-1DDA-4F83-A904-24A35C38883A" }, { "criteria": "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B93B3ED-AF82-49A9-8C7F-E5F652F19669" }, { "criteria": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A35FC777-A34E-4C7B-9E93-8F17F3AD5180" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6B060E4-B5A6-4469-828E-211C52542547" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "974C3541-990C-4CD4-A05A-38FA74A84632" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58792F77-B06F-4780-BA25-FE1EE6C3FDD9" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9419322-572F-4BB6-8416-C5E96541CF33" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFC50555-C084-46A3-9C9F-949C5E3BB448" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C25D6E1-D283-4CEA-B47B-60C47A5C0797" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD18A446-C634-417E-86AC-B19B6DDDC856" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4BB852E-61B2-4842-989F-C6C0C901A8D7" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24DD9D59-E2A2-4116-A887-39E8CC2004FC" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F28D7457-607E-4E0C-909A-413F91CFCD82" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EACF214-FA27-44FF-A431-927AB79377A1" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2B58895-0E2A-4466-9CB2-0083349A83B2" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2311919C-7864-469D-B0F6-9B11D8D0A1C3" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19876495-4C1A-487C-955A-C5AA46362A1F" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D75286DD-50BC-4B72-8AC8-E20730124DC2" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1998C972-497E-4916-B50E-FB32303EEA8E" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB" }, { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08E90AFA-C262-46D0-B60E-26B67C9602D5" }, { "criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3528DABD-B821-4D23-AE12-614A9CA92C46" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0315FB43-D199-4734-B724-50ED031C0020" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11D69B83-4EF3-407B-8E8C-DE623F099C17" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D221688-18A0-453D-8D13-6B68011FCA13" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "597094EC-D23F-4EC4-A140-96F287679124" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F0D201-B1DC-4024-AF77-A284673618F3" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "052E3862-BFB7-42E7-889D-8590AFA8EF37" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BB0B27C-04EA-426F-9016-7406BACD91DF" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "409E324A-C040-494F-A026-9DCAE01C07F8" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6474B775-C893-491F-A074-802AFB1FEDD8" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC79FF22-2664-4C40-B0B3-6D23B5F45162" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EFE2E73-9536-41A9-B83B-0A06B54857F4" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9440B25-D206-4914-9557-B5F030890DEC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9933557-3BCA-4D92-AD4F-27758A0D3347" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10A60552-15A5-4E95-B3CE-99A4B26260C1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C84296C-2C8A-4DCD-9751-52951F8BEA9F" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6996B14-925B-46B8-982F-3545328B506B" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC80CF67-C51D-442C-9526-CFEDE84A6304" }, { "criteria": "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C720DACC-CF4B-4A00-818C-8303A7D7DED6" }, { "criteria": "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B502A61-44FB-4CD4-85BE-88D4ACCCA441" }, { "criteria": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1" }, { "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84A50ED3-FD0D-4038-B3E7-CC65D166C968" }, { "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96" }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9D76A8D-832B-411E-A458-186733C66010" }, { "criteria": "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7458BA31-812E-40C9-BB92-8688A3BCBA56" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "300A6A65-05FD-401C-80F6-B5F5B1F056E0" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA3D53C9-3806-45E6-8AE9-7D41280EF64C" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D29C5A03-A7C9-4780-BB63-CF1E874D018D" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70440F49-AEE9-41BE-8E1A-43AB657C8E09" }, { "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02EE2D72-B1E6-4380-80B0-E40A23DDD115" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F239BA8A-6B41-4B08-8C7C-25D235812C50" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89BA858B-9466-4640-84AE-DC5BDC65D6B8" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85F2D904-E830-4034-9CCB-0FF65019622C" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EA56868-ACA1-4C65-9FFB-A68129D2428A" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BA2E629-58C6-4BA0-A447-F8F570B35E74" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5F98B9A-880E-45F0-8C16-12B22970F0D1" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C89BA3B6-370B-4911-A363-935A9C9EACF5" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F1B4D15-0562-44D6-B80B-35A8F432BD41" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7" }, { "criteria": "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C7018E7-F90C-435D-A07A-05A294EA2827" }, { "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16915004-1006-41D6-9E42-D1A5041E442D" }, { "criteria": "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64" }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA" }, { "criteria": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AB70F82-52BB-4D0D-9A24-9AF67278466D" }, { "criteria": "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "100A2456-BF20-4461-8DC9-C61889322B29" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C7D4F57-E186-497A-B390-92E5D2C7E894" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEC3F6F3-9A6E-4A98-A967-6776C872475C" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC3218DD-A565-4AB8-86FE-E7F59AC0535F" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97AEDB57-202F-4B53-8815-21836F177060" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E27180A1-9767-4CD3-978C-7538155B162D" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAAA9376-A060-49AE-86A7-6B28E26ED5D9" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E06DCF0D-3241-453A-A0E4-937FE25EC404" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B484D091-62DE-4EF2-AC54-26896CA8B315" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC5AC26E-3F3F-4D14-BE65-82B4432AB382" }, { "criteria": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9428589A-0BD2-469E-978D-38239117D972" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E94583A-5184-462E-9FC4-57B35DA06DA7" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E905FAAD-37B6-4DD0-A752-2974F8336273" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BD12488-1ED8-4751-ABF5-3578D54750A8" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE3733CF-4C88-443C-9B90-6477C9C500D0" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C500A75-D75E-45B4-B582-0F0DF27C3C04" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86FD134D-A5C5-4B08-962D-70CF07C74923" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA84692E-F99D-4207-B4F2-799A6ADB88AD" }, { "criteria": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B0F1091-4B76-44F5-B896-6D37E2F909A2" } ], "operator": "OR" } ] } ]