Show plain JSON{"id": "CVE-2004-0535", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2004-08-06T04:00:00.000", "references": [{"url": "ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc", "source": "cve@mitre.org"}, {"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168", "source": "cve@mitre.org"}, {"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845", "source": "cve@mitre.org"}, {"url": "http://lwn.net/Articles/91155/", "source": "cve@mitre.org"}, {"url": "http://security.gentoo.org/glsa/glsa-200407-02.xml", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log", "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062", "source": "cve@mitre.org"}, {"url": "http://www.novell.com/linux/security/advisories/2004_20_kernel.html", "source": "cve@mitre.org"}, {"url": "http://www.redhat.com/support/errata/RHSA-2004-413.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.redhat.com/support/errata/RHSA-2004-418.html", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/10352", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16159", "source": "cve@mitre.org"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11136", "source": "cve@mitre.org"}, {"url": "ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lwn.net/Articles/91155/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://security.gentoo.org/glsa/glsa-200407-02.xml", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.novell.com/linux/security/advisories/2004_20_kernel.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2004-413.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2004-418.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/10352", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16159", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11136", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a \"buffer overflow\" by some sources."}, {"lang": "es", "value": "El controlador e1000 del kernel de Linux 2.4.26 y anteriores no inicializa la memoria antes de usarla, lo que permite a usuarios locales leer porciones de la memoria del kernel. NOTA: Este problema ha sido originalmente descrito incorrectamente por otras fuentes como un \"desbordamiento de b\u00fafer\"."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701"}, {"criteria": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A451599B-5F4F-4D7F-B5EF-3AE9F9B89D62"}, {"criteria": "cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD74DAB4-A68E-4748-BC43-2285FC9804D6"}, {"criteria": "cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52E04F16-A0C7-4B0C-A70E-2CA683E0C33B"}, {"criteria": "cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "941DFF67-E9F6-41F0-A5CB-90105733327D"}, {"criteria": "cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "117BBA08-9C1B-4CAC-A418-B044D69C27D1"}, {"criteria": "cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F8C98F-E10C-4FE8-96E7-27426F369E78"}, {"criteria": "cpe:2.3:a:suse:suse_linux_firewall_live-cd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3D7140F-589F-44DC-84ED-93FE6989F821"}, {"criteria": "cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FDDFB81-4DFE-416A-BCE1-ED96AC3E69B5"}, {"criteria": "cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18BAE686-972A-4756-9E5D-CF2830700891"}, {"criteria": "cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD14661C-E3BE-44DF-BC8D-294322BF23EA"}, {"criteria": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4007B0D-9606-46BD-866A-7911BEA292BE"}, {"criteria": "cpe:2.3:o:engardelinux:secure_community:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "835156D0-D0D8-4A82-9342-95E7239E3477"}, {"criteria": "cpe:2.3:o:engardelinux:secure_linux:1.5:*:professional:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E62C413-935F-459C-8F11-73F5B483E759"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E244C37-E366-482E-9173-9376D0839839"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11F96BB9-6509-4F1E-9590-E55EE8C6F992"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "718D4631-440E-4783-8966-B2A2D3EF89B3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7015F57A-1E3B-42D2-9D12-F695078EFB21"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "467721EE-5130-46C5-BBB7-0F4878F3F171"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "171257E7-12C5-4283-88F7-FFE643995563"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0887E02F-9F36-41F0-9F75-060B8414D7BF"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D77F8919-4064-4EA5-A948-76178EA21F83"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E7C423D-23DE-4C7B-A518-66F87E041925"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EA1382E-71B0-4E65-A310-716A244F4FB1"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "824BBD31-8F3B-4F05-981B-ABF662BBF5F2"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "388A5C99-1F60-4C20-9AE5-6E73E5A3F819"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5888F8D7-15C2-4435-BB3C-8674DFAF0089"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29439AD0-EB8D-4675-A77A-6548FF27ADA3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F27AADF6-1605-47FC-8C4D-87827A578A90"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B42F4080-A76F-4D17-85E2-CD2D2E4D0450"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6968EF1D-7CC5-430D-866D-206F66486F63"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50E6F5C5-BF74-4C10-830A-F232D528D290"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A399D94B-D08D-4454-A07A-6634C9AE612F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCD8E4AE-FEF7-4CE2-B338-4F766921593F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13A8B50A-73F6-4FCF-A81F-FB624FBA7143"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D27D843-2DA7-4481-857C-09FDC4FBD45C"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCB93128-2743-4668-8C48-9B7282D4A672"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "040991B8-FB4B-480B-B53B-AA7A884F9F19"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFA592BC-5846-4FC1-B2A7-13E622705DA8"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59688C40-C92F-431E-ADD7-6782622862D3"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5FE15BF-91C7-452A-BE1B-7EC9632421C2"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4AD30B9-8FBA-48B3-B2B2-014C950B9BAA"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "279317B9-AF2F-43E9-BEE5-518FC6D23A87"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4177C378-7729-46AB-B49B-C6DAED3200E7"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F0D201-B1DC-4024-AF77-A284673618F3"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "052E3862-BFB7-42E7-889D-8590AFA8EF37"}, {"criteria": "cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7840155-DCF0-4C34-815B-71F872D31A20"}, {"criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651"}, {"criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28CD54FE-D682-4063-B7C3-8B29B26B39AD"}, {"criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37F124FE-15F1-49D7-9E03-8E036CE1A20C"}, {"criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A"}, {"criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958"}, {"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"}, {"criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815"}, {"criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}