ID USN-2600-2 Type ubuntu Reporter Ubuntu Modified 2015-05-09T00:00:00
Description
USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated regression in the auditing of some path names was introduced. Due to the regression the system could crash under certain conditions.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
{"id": "USN-2600-2", "bulletinFamily": "unix", "title": "Linux kernel regression", "description": "USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated regression in the auditing of some path names was introduced. Due to the regression the system could crash under certain conditions.\n\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nA race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.", "published": "2015-05-09T00:00:00", "modified": "2015-05-09T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://usn.ubuntu.com/2600-2/", "reporter": "Ubuntu", "references": ["https://usn.ubuntu.com/usn/usn-2600-1", "https://launchpad.net/bugs/1450442"], "cvelist": [], "type": "ubuntu", "lastseen": "2018-03-29T18:17:38", "history": [], "edition": 1, "hashmap": [{"key": "affectedPackage", "hash": "15df7da8bc65cbb924cac6a4971c8f8c"}, {"key": "bulletinFamily", "hash": "4913a9178621eadcdf191db17915fbcb"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "21631cd72273f8009553769e92e38e1b"}, {"key": "href", "hash": "43cc3737d87ece37ba752036a69ebae1"}, {"key": "modified", "hash": "844d4ac6f5ec8bb7c27043f57502d26f"}, {"key": "published", "hash": "844d4ac6f5ec8bb7c27043f57502d26f"}, {"key": "references", "hash": "bb184cb0b1bf17d4e62409a9326f0255"}, {"key": "reporter", "hash": "3d945423f8e9496c429a5d8c65b4604f"}, {"key": "title", "hash": "15d83ce6b74618ae788e39e65b649362"}, {"key": "type", "hash": "1d41c853af58d3a7ae54990ce29417d8"}], "hash": "d8376b21fb0728448daab257c04adf49c63846f99784b8558e71d903ce9f6a50", "viewCount": 0, "enchantments": {"vulnersScore": 9.0}, "objectVersion": "1.3", "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-powerpc-e500mc", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-lowlatency", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-generic", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-powerpc-smp", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-generic-lpae", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-powerpc64-emb", "packageVersion": "3.16.0-37.51"}, {"OS": "Ubuntu", "OSVersion": "14.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "linux-image-3.16.0-37-powerpc64-smp", "packageVersion": "3.16.0-37.51"}]}
{"result": {"openvas": [{"lastseen": "2018-01-29T11:03:50", "references": ["3537-1", "http://www.ubuntu.com/usn/usn-3537-1/"], "pluginID": "1361412562310843430", "description": "Check the version of mysql-5.7", "edition": 2, "reporter": "Copyright (C) 2018 Greenbone Networks GmbH", "published": "2018-01-23T00:00:00", "title": "Ubuntu Update for mysql-5.7 USN-3537-1", "type": "openvas", "enchantments": {"score": {"modified": "2018-01-29T11:03:50", "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:N/", "value": 5.5}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-2565", "CVE-2018-2583", "CVE-2018-2646", "CVE-2018-2586", "CVE-2018-2696", "CVE-2018-2562", "CVE-2018-2590", "CVE-2018-2703", "CVE-2018-2612", "CVE-2018-2600", "CVE-2018-2667", "CVE-2018-2668", "CVE-2018-2640", "CVE-2018-2647", "CVE-2018-2645", "CVE-2018-2665", "CVE-2018-2622", "CVE-2018-2573", "CVE-2018-2576"], "modified": "2018-01-26T00:00:00", "id": "OPENVAS:1361412562310843430", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843430", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3537_1.nasl 8551 2018-01-26 14:15:40Z asteins $\n#\n# Ubuntu Update for mysql-5.7 USN-3537-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843430\");\n script_version(\"$Revision: 8551 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-26 15:15:40 +0100 (Fri, 26 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-23 07:38:42 +0100 (Tue, 23 Jan 2018)\");\n script_cve_id(\"CVE-2018-2562\", \"CVE-2018-2565\", \"CVE-2018-2573\", \"CVE-2018-2576\", \n \"CVE-2018-2583\", \"CVE-2018-2586\", \"CVE-2018-2590\", \"CVE-2018-2600\",\n \"CVE-2018-2612\", \"CVE-2018-2622\", \"CVE-2018-2640\", \"CVE-2018-2645\",\n \"CVE-2018-2646\", \"CVE-2018-2647\", \"CVE-2018-2665\", \"CVE-2018-2667\",\n \"CVE-2018-2668\", \"CVE-2018-2696\", \"CVE-2018-2703\"); \n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for mysql-5.7 USN-3537-1\");\n script_tag(name: \"summary\", value: \"Check the version of mysql-5.7\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help of \n detect NVT and check if the version is vulnerable or not.\"); \n script_tag(name: \"insight\", value: \"Multiple security issues were discovered in \n MySQL and this update includes new upstream MySQL versions to fix these issues. \n MySQL has been updated to 5.5.59 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS, and \n Ubuntu 17.10 have been updated to MySQL 5.7.21. In addition to security fixes, \n the updated packages contain bug fixes, new features, and possibly incompatible \n changes. Please see the following for more information: \n http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html\n http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-21.html \n http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\"); \n script_tag(name: \"affected\", value: \"mysql-5.7 on Ubuntu 17.10 ,\n Ubuntu 16.04 LTS ,\n Ubuntu 14.04 LTS\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n\n script_xref(name: \"USN\", value: \"3537-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-3537-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.5\", ver:\"5.5.59-0ubuntu0.14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.7\", ver:\"5.7.21-0ubuntu0.17.10.1\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"mysql-server-5.7\", ver:\"5.7.21-0ubuntu0.16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:22:51", "references": ["http://www.ubuntu.com/usn/usn-2600-2/", "2600-2"], "pluginID": "1361412562310842204", "description": "Check the version of linux", "edition": 3, "reporter": "Copyright (C) 2015 Greenbone Networks GmbH", "published": "2015-05-09T00:00:00", "title": "Ubuntu Update for linux USN-2600-2", "type": "openvas", "enchantments": {"score": {"modified": "2017-12-04T11:22:51", "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N/", "value": 3.5}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": [], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:1361412562310842204", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842204", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux USN-2600-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842204\");\n script_version(\"$Revision: 7956 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 06:53:44 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-09 05:52:52 +0200 (Sat, 09 May 2015)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-2600-2\");\n script_tag(name: \"summary\", value: \"Check the version of linux\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help\nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"USN-2600-1 fixed vulnerabilities in the\nLinux kernel, however an unrelated regression in the auditing of some path names\nwas introduced. Due to the regression the system could crash under certain\nconditions.\n\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nOriginal advisory details:\n\nA race condition between chown() and execve() was discovered in the Linux\nkernel. A local attacker could exploit this race by using chown on a\nsetuid-user-binary to gain administrative privileges.\");\n script_tag(name: \"affected\", value: \"linux on Ubuntu 14.10\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n script_xref(name: \"USN\", value: \"2600-2\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-2600-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-generic\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-generic-lpae\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-lowlatency\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc-e500mc\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc-smp\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc64-emb\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc64-smp\", ver:\"3.16.0-37.51\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-12-04T11:24:13", "references": ["2600-1", "http://www.ubuntu.com/usn/usn-2600-1/"], "pluginID": "1361412562310842196", "description": "Check the version of linux", "edition": 3, "reporter": "Copyright (C) 2015 Greenbone Networks GmbH", "published": "2015-05-06T00:00:00", "title": "Ubuntu Update for linux USN-2600-1", "type": "openvas", "enchantments": {"score": {"modified": "2017-12-04T11:24:13", "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N/", "value": 3.5}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3339"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:1361412562310842196", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842196", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for linux USN-2600-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842196\");\n script_version(\"$Revision: 7956 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 06:53:44 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2015-05-06 06:09:47 +0200 (Wed, 06 May 2015)\");\n script_cve_id(\"CVE-2015-3339\");\n script_tag(name:\"cvss_base\", value:\"6.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-2600-1\");\n script_tag(name: \"summary\", value: \"Check the version of linux\");\n script_tag(name: \"vuldetect\", value: \"Get the installed version with the help\nof detect NVT and check if the version is vulnerable or not.\");\n script_tag(name: \"insight\", value: \"A race condition between chown() and\nexecve() was discovered in the Linux kernel. A local attacker could exploit this\nrace by using chown on a setuid-user-binary to gain administrative privileges.\");\n script_tag(name: \"affected\", value: \"linux on Ubuntu 14.10\");\n script_tag(name: \"solution\", value: \"Please Install the Updated Packages.\");\n script_xref(name: \"USN\", value: \"2600-1\");\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-2600-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU14.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-generic\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-generic-lpae\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-lowlatency\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc-e500mc\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc-smp\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc64-emb\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-3.16.0-37-powerpc64-smp\", ver:\"3.16.0-37.49\", rls:\"UBUNTU14.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2018-01-31T06:57:44", "references": [], "pluginID": "106265", "description": "Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.5.59 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS, and Ubuntu 17.10 have been updated to MySQL 5.7.21.\n\nIn addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.\n\nPlease see the following for more information:\nhttp://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-21.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628 .html.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 4, "reporter": "Tenable", "published": "2018-01-23T00:00:00", "title": "Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : mysql-5.5, mysql-5.7 vulnerabilities (USN-3537-1)", "type": "nessus", "enchantments": {"score": {"modified": "2018-01-31T06:57:44", "vector": "AV:N/AC:M/Au:M/C:N/I:P/A:N/", "value": 2.8}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-2565", "CVE-2018-2583", "CVE-2018-2646", "CVE-2018-2586", "CVE-2018-2696", "CVE-2018-2562", "CVE-2018-2590", "CVE-2018-2703", "CVE-2018-2612", "CVE-2018-2600", "CVE-2018-2667", "CVE-2018-2668", "CVE-2018-2640", "CVE-2018-2647", "CVE-2018-2645", "CVE-2018-2665", "CVE-2018-2622", "CVE-2018-2573", "CVE-2018-2576"], "modified": "2018-01-30T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.5", "cpe:/o:canonical:ubuntu_linux:17.10", "p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3537-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=106265", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3537-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106265);\n script_version(\"$Revision: 3.3 $\");\n script_cvs_date(\"$Date: 2018/01/30 18:01:30 $\");\n\n script_cve_id(\"CVE-2018-2562\", \"CVE-2018-2565\", \"CVE-2018-2573\", \"CVE-2018-2576\", \"CVE-2018-2583\", \"CVE-2018-2586\", \"CVE-2018-2590\", \"CVE-2018-2600\", \"CVE-2018-2612\", \"CVE-2018-2622\", \"CVE-2018-2640\", \"CVE-2018-2645\", \"CVE-2018-2646\", \"CVE-2018-2647\", \"CVE-2018-2665\", \"CVE-2018-2667\", \"CVE-2018-2668\", \"CVE-2018-2696\", \"CVE-2018-2703\");\n script_osvdb_id(172901, 172902, 172903, 172904, 172905, 172906, 172925, 172926, 172927, 172928, 172929, 172930, 172931, 172932, 172933, 172934, 172935, 172936, 172937);\n script_xref(name:\"USN\", value:\"3537-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : mysql-5.5, mysql-5.7 vulnerabilities (USN-3537-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security issues were discovered in MySQL and this update\nincludes new upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.5.59 in Ubuntu 14.04 LTS. Ubuntu 16.04\nLTS, and Ubuntu 17.10 have been updated to MySQL 5.7.21.\n\nIn addition to security fixes, the updated packages contain bug fixes,\nnew features, and possibly incompatible changes.\n\nPlease see the following for more information:\nhttp://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html\nhttp://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-21.html\nhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628\n.html.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected mysql-server-5.5 and / or mysql-server-5.7\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:mysql-server-5.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:17.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018 Canonical, Inc. / NASL script (C) 2018 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(14\\.04|16\\.04|17\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 16.04 / 17.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"mysql-server-5.5\", pkgver:\"5.5.59-0ubuntu0.14.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"mysql-server-5.7\", pkgver:\"5.7.21-0ubuntu0.16.04.1\")) flag++;\nif (ubuntu_check(osver:\"17.10\", pkgname:\"mysql-server-5.7\", pkgver:\"5.7.21-0ubuntu0.17.10.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mysql-server-5.5 / mysql-server-5.7\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-10-29T13:42:30", "references": [], "pluginID": "83334", "description": "USN-2600-1 fixed vulnerabilities in the Linux kernel, however an unrelated regression in the auditing of some path names was introduced. Due to the regression the system could crash under certain conditions.\n\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nA race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 3, "reporter": "Tenable", "published": "2015-05-11T00:00:00", "title": "Ubuntu 14.10 : linux regression (USN-2600-2)", "type": "nessus", "enchantments": {"score": {"modified": "2017-10-29T13:42:30", "vector": "AV:N/AC:M/Au:M/C:N/I:P/A:N/", "value": 2.8}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": [], "modified": "2016-10-26T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-lowlatency", "cpe:/o:canonical:ubuntu_linux:14.10"], "id": "UBUNTU_USN-2600-2.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=83334", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2600-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83334);\n script_version(\"$Revision: 2.4 $\");\n script_cvs_date(\"$Date: 2016/10/26 14:16:27 $\");\n\n script_bugtraq_id(74243);\n script_xref(name:\"USN\", value:\"2600-2\");\n\n script_name(english:\"Ubuntu 14.10 : linux regression (USN-2600-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-2600-1 fixed vulnerabilities in the Linux kernel, however an\nunrelated regression in the auditing of some path names was\nintroduced. Due to the regression the system could crash under certain\nconditions.\n\nThis update fixes the problem.\n\nWe apologize for the inconvenience.\n\nA race condition between chown() and execve() was discovered in the\nLinux kernel. A local attacker could exploit this race by using chown\non a setuid-user-binary to gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected linux-image-3.16-generic,\nlinux-image-3.16-generic-lpae and / or linux-image-3.16-lowlatency\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(14\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-generic\", pkgver:\"3.16.0-37.51\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-generic-lpae\", pkgver:\"3.16.0-37.51\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-lowlatency\", pkgver:\"3.16.0-37.51\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.16-generic / linux-image-3.16-generic-lpae / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2017-10-29T13:37:04", "references": [], "pluginID": "83261", "description": "A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "edition": 3, "reporter": "Tenable", "published": "2015-05-06T00:00:00", "title": "Ubuntu 14.10 : linux vulnerability (USN-2600-1)", "type": "nessus", "enchantments": {"score": {"modified": "2017-10-29T13:37:04", "vector": "AV:N/AC:M/Au:M/C:N/I:P/A:N/", "value": 2.8}}, "naslFamily": "Ubuntu Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-3339"], "modified": "2016-10-26T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-lowlatency", "cpe:/o:canonical:ubuntu_linux:14.10"], "id": "UBUNTU_USN-2600-1.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=83261", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2600-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(83261);\n script_version(\"$Revision: 2.5 $\");\n script_cvs_date(\"$Date: 2016/10/26 14:16:27 $\");\n\n script_cve_id(\"CVE-2015-3339\");\n script_osvdb_id(121170);\n script_xref(name:\"USN\", value:\"2600-1\");\n\n script_name(english:\"Ubuntu 14.10 : linux vulnerability (USN-2600-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A race condition between chown() and execve() was discovered in the\nLinux kernel. A local attacker could exploit this race by using chown\non a setuid-user-binary to gain administrative privileges.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected linux-image-3.16-generic,\nlinux-image-3.16-generic-lpae and / or linux-image-3.16-lowlatency\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.16-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/05/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/05/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2016 Canonical, Inc. / NASL script (C) 2015-2016 Tenable Network Security, Inc.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(14\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-generic\", pkgver:\"3.16.0-37.49\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-generic-lpae\", pkgver:\"3.16.0-37.49\")) flag++;\nif (ubuntu_check(osver:\"14.10\", pkgname:\"linux-image-3.16.0-37-lowlatency\", pkgver:\"3.16.0-37.49\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.16-generic / linux-image-3.16-generic-lpae / etc\");\n}\n", "cvss": {"score": 6.2, "vector": "AV:LOCAL/AC:HIGH/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-03-29T18:17:02", "references": ["https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2590", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2622", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2647", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2565", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2583", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2576", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2668", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2667", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2562", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2586", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2646", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2600", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2703", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2645", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2573", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2665", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2640", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2612", "https://people.canonical.com/~ubuntu-security/cve/CVE-2018-2696"], "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "16.04", "packageVersion": "5.7.21-0ubuntu0.16.04.1", "arch": "noarch", "packageFilename": "UNKNOWN", "packageName": "mysql-server-5.7", "operator": "lt"}, {"OS": "Ubuntu", "OSVersion": "17.10", "packageVersion": "5.7.21-0ubuntu0.17.10.1", "arch": "noarch", "packageFilename": "UNKNOWN", "packageName": "mysql-server-5.7", "operator": "lt"}, {"OS": "Ubuntu", "OSVersion": "14.04", "packageVersion": "5.5.59-0ubuntu0.14.04.1", "arch": "noarch", "packageFilename": "UNKNOWN", "packageName": "mysql-server-5.5", "operator": "lt"}], "description": "Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues.\n\nMySQL has been updated to 5.5.59 in Ubuntu 14.04 LTS. Ubuntu 16.04 LTS, and Ubuntu 17.10 have been updated to MySQL 5.7.21.\n\nIn addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.\n\nPlease see the following for more information: <http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-59.html> <http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-21.html> <http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html>", "edition": 1, "reporter": "Ubuntu", "published": "2018-01-22T00:00:00", "title": "MySQL vulnerabilities", "type": "ubuntu", "enchantments": {"score": {"modified": "2018-03-29T18:17:02", "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:P/", "value": 4.9}}, "bulletinFamily": "unix", "cvelist": ["CVE-2018-2565", "CVE-2018-2583", "CVE-2018-2646", "CVE-2018-2586", "CVE-2018-2696", "CVE-2018-2562", "CVE-2018-2590", "CVE-2018-2703", "CVE-2018-2612", "CVE-2018-2600", "CVE-2018-2667", "CVE-2018-2668", "CVE-2018-2640", "CVE-2018-2647", "CVE-2018-2645", "CVE-2018-2665", "CVE-2018-2622", "CVE-2018-2573", "CVE-2018-2576"], "modified": "2018-01-22T00:00:00", "id": "USN-3537-1", "href": "https://usn.ubuntu.com/3537-1/", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "cve": [{"lastseen": "2018-04-06T10:53:03", "references": ["https://usn.ubuntu.com/3597-1/", "https://www.vmware.com/security/advisories/VMSA-2018-0007.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html", "https://usn.ubuntu.com/3531-3/", "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "https://usn.ubuntu.com/3582-1/", "https://support.citrix.com/article/CTX231399", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html", "https://usn.ubuntu.com/3549-1/", "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "https://access.redhat.com/errata/RHSA-2018:0292", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html", "http://xenbits.xen.org/xsa/advisory-254.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html", "https://usn.ubuntu.com/3581-1/", "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc", "https://support.f5.com/csp/article/K91229003", "https://www.synology.com/support/security/Synology_SA_18_01", "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr", "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "https://support.lenovo.com/us/en/solutions/LEN-18282", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html", "http://www.securityfocus.com/bid/102376", "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "https://usn.ubuntu.com/3580-1/", "https://usn.ubuntu.com/usn/usn-3516-1/", "http://www.kb.cert.org/vuls/id/584653", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html", "https://usn.ubuntu.com/3541-2/", "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "https://usn.ubuntu.com/3581-2/", "https://usn.ubuntu.com/3597-2/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "https://developer.arm.com/support/security-update", "https://usn.ubuntu.com/3542-2/", "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html", "https://www.exploit-db.com/exploits/43427/", "https://usn.ubuntu.com/3620-2/", "https://spectreattack.com/", "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "http://www.securitytracker.com/id/1040071", "https://usn.ubuntu.com/3560-1/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html", "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "https://security.netapp.com/advisory/ntap-20180104-0001/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html", "https://usn.ubuntu.com/3540-2/", "https://usn.ubuntu.com/3531-1/", "https://usn.ubuntu.com/3561-1/", "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "https://usn.ubuntu.com/3582-2/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel", "https://www.debian.org/security/2018/dsa-4120", "https://usn.ubuntu.com/3594-1/"], "description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "edition": 16, "reporter": "NVD", "published": "2018-01-04T08:29:00", "title": "CVE-2017-5715", "type": "cve", "enchantments": {"score": {"modified": "2018-04-06T10:53:03", "vector": "AV:L/AC:L/Au:M/C:C/I:C/A:C/", "value": 6.5}}, "assessment": {"system": "", "name": "", "href": ""}, "bulletinFamily": "NVD", "cvelist": ["CVE-2017-5715"], "scanner": [], "modified": "2018-04-05T21:29:08", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_e5:1620_v2", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon_e3:1245_v5", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5:2420_v2", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/h:intel:xeon_e3:1285_v4", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:xeon_e5:2650l_v3", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:xeon_e5:1630_v3", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:xeon_e5:2408l_v3", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:xeon_e3:1268l_v3", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/h:intel:xeon_e3:1240_v5", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e3:1275", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e5:2640_v2", "cpe:/h:intel:xeon_e5:2628l_v4", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e5:1650_v2", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:xeon_e5:1630_v4", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e5:2630", "cpe:/h:intel:xeon_e5:2403_v2", "cpe:/h:intel:xeon_e5:2643_v3", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon_e3:1230_v3", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:arm:cortex-a:73", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5:2637_v3", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:xeon_e5:2628l_v3", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:xeon_e5:1620_v3", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:xeon_e3:1241_v3", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:xeon_e3:1231_v3", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:2418l_v2", "cpe:/h:intel:xeon_e3:1276_v3", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:xeon_e5:1680_v4", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:xeon_e5:2630_v4", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e3:1230_v6", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3:1258l_v4", "cpe:/h:intel:xeon_e3:1230", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:xeon_e5:1650_v3", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:xeon_e5:2637_v2", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:arm:cortex-a:72", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:xeon_e3:1245_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:xeon_e3:1220", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:xeon_e3:1501m_v6", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:xeon_e3:1270_v2", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:xeon_e3:1225_v5", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3:1240l_v3", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:xeon_e5:2430_v2", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/h:intel:xeon_e5:2637_v4", "cpe:/h:intel:core_i7:4712hq", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:xeon_e5:2640_v4", "cpe:/h:intel:xeon_e5:2637", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:xeon_e3:1220_v2", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5:2609_v3", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e3:1280", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e5:2407", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:xeon_e5:2618l_v2", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e3:1240", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_e5:1620", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e3:1245_v6", "cpe:/h:intel:xeon_e3:1286_v3", "cpe:/h:intel:xeon_e5:2643_v2", "cpe:/h:intel:xeon_e5:2648l", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:xeon_e5:2618l_v3", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:xeon_e5:2450", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:xeon_e5:2430", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:xeon_e3:1220_v5", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5:2603_v3", "cpe:/h:intel:xeon_e5:2428l_v2", "cpe:/h:intel:xeon_e3:1235", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:arm:cortex-a:17", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:xeon_e3:1230l_v3", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/h:intel:core_i3:4158u", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:xeon_e5:2648l_v2", "cpe:/h:intel:xeon_e3:1260l", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:xeon_e3:1225_v3", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e3:1280_v2", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon_e5:2650_v4", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/h:intel:xeon_e3:1220_v6", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:xeon_e5:2630l_v2", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:core_i5:4690t", "cpe:/h:arm:cortex-a:57", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:xeon_e5:2430l", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:xeon_e5:2608l_v3", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3:1285_v3", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:xeon_e5:1660_v2", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e5:2650l_v2", "cpe:/h:intel:core_i5:2320", "cpe:/h:intel:xeon_e5:2438l_v3", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:xeon_e5:2650", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:xeon_e3:1275_v2", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e5:2603_v4", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e3:1275l_v3", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:xeon_e5:2609_v4", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:xeon_e3:1220l", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e3:1105c_v2", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:xeon_e3:1275_v3", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:xeon_e5:2623_v3", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3:1505m_v5", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e5:2440", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_gold:6140m", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon_e3:1505l_v5", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:xeon_e5:2470", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:xeon_e5:2608l_v4", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/h:intel:xeon_e5:2648l_v4", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:xeon_e3:1240_v2", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:xeon_e5:2448l", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:arm:cortex-a:9", "cpe:/h:intel:xeon_gold:5120t", "cpe:/h:intel:xeon_e3:1280_v6", "cpe:/h:intel:xeon_e3:1285l_v4", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:core_i3:6320", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:2640_v3", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e3:1240_v6", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e3:1125c", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:arm:cortex-a:15", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3:1220l_v2", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:xeon_e5:2650_v3", "cpe:/h:intel:core_i7:4770s", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:xeon_e5:1428l_v2", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e3:1271_v3", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:core_i5:2400", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:xeon_e5:2450l", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e3:1246_v3", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:xeon_bronze:3104", "cpe:/h:intel:core_i3:3245", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e5:2643", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e3:1240_v3", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:xeon_e5:2620_v4", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:xeon_e5:2623_v4", "cpe:/h:intel:xeon_e5:2418l", "cpe:/h:intel:xeon_e3:1225_v6", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon_e5:2620_v2", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon_e3:1220l_v3", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon_bronze:3106", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e5:2630l_v4", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/h:intel:xeon_e5:2448l_v2", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:xeon_e5:1660", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:xeon_e3:1265l_v3", "cpe:/h:intel:xeon_e3:1290", "cpe:/h:intel:core_i5:6287u", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon_e5:1660_v4", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:xeon_e3:1285l_v3", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:xeon_e5:2609", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e5:2418l_v3", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:xeon_e5:2620", "cpe:/h:intel:xeon_e5:2603_v2", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon_e3:1230_v2", "cpe:/h:intel:xeon_e5:2640", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:arm:cortex-a:75", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e3:1265l_v4", "cpe:/h:intel:xeon_e3:1280_v3", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:xeon_e3:1270_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:xeon_e5:2620_v3", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_e3:1286l_v3", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e3:1245_v3", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/h:intel:xeon_e5:2403", "cpe:/h:intel:xeon_e5:2440_v2", "cpe:/h:intel:xeon_e5:1428l", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e3:1270", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e5:2630l_v3", "cpe:/h:intel:xeon_e3:1260l_v5", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e3:1285_v6", "cpe:/h:intel:xeon_e5:1650_v4", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:xeon_e3:1235l_v5", "cpe:/h:intel:xeon_e5:1660_v3", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:xeon_e5:2609_v2", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:core_i5:4670s", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3:1240l_v5", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e3:1275_v6", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e3:1245", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:xeon_e5:2648l_v3", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e3:1270_v5", "cpe:/h:intel:xeon_e5:2628l_v2", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:xeon_e3:1270_v6", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e3:1225", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5:1428l_v3", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e3:1505l_v6", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:xeon_e3:1268l_v5", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:xeon_e5:2603", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e5:1620_v4", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:xeon_e3:1230_v5", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:xeon_e5:2630l", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e3:1501l_v6", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:xeon_e5:2428l", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2430l_v2", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/h:intel:xeon_e5:2630_v2", "cpe:/h:intel:xeon_e5:2470_v2", "cpe:/h:intel:xeon_e5:2650l", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:xeon_e5:2630_v3", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/h:intel:xeon_e3:1265l_v2", "cpe:/h:intel:core_i5:2450p", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:xeon_e3:1125c_v2", "cpe:/h:intel:xeon_e3:1281_v3", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:xeon_e3:1290_v2", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e5:1650", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e5:2643_v4", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2407_v2", "cpe:/h:intel:xeon_e5:2650_v2", "cpe:/h:intel:xeon_e3:1225_v2", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:xeon_e5:2450l_v2", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:core_i7:7700hq", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:xeon_e5:2428l_v3", "cpe:/h:intel:core_i5:4302y", "cpe:/h:intel:xeon_e3:1105c", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon_e5:2420", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/h:intel:xeon_e3:1220_v3", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:xeon_e5:1680_v3", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:xeon_e3:1275_v5", "cpe:/h:intel:xeon_e5:2618l_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:xeon_e5:2450_v2", "cpe:/h:intel:xeon_e3:1278l_v4", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e3:1280_v5", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426", "cpe:/h:intel:xeon_e3:1226_v3"], "id": "CVE-2017-5715", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5715", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-04-20T10:42:49", "references": ["https://usn.ubuntu.com/3597-1/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html", "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "https://usn.ubuntu.com/3540-1/", "https://support.citrix.com/article/CTX231399", "https://usn.ubuntu.com/3549-1/", "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "http://www.securityfocus.com/bid/102371", "https://access.redhat.com/errata/RHSA-2018:0292", "http://xenbits.xen.org/xsa/advisory-254.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html", "https://support.f5.com/csp/article/K91229003", "https://www.synology.com/support/security/Synology_SA_18_01", "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "https://usn.ubuntu.com/3542-1/", "https://support.lenovo.com/us/en/solutions/LEN-18282", "https://usn.ubuntu.com/3541-1/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html", "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "https://usn.ubuntu.com/3580-1/", "https://usn.ubuntu.com/usn/usn-3516-1/", "http://www.kb.cert.org/vuls/id/584653", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html", "https://usn.ubuntu.com/3541-2/", "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "https://usn.ubuntu.com/3597-2/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "https://developer.arm.com/support/security-update", "https://usn.ubuntu.com/3542-2/", "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "https://www.exploit-db.com/exploits/43427/", "https://spectreattack.com/", "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "http://www.securitytracker.com/id/1040071", "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "https://01.org/security/advisories/intel-oss-10002", "https://security.netapp.com/advisory/ntap-20180104-0001/", "https://usn.ubuntu.com/3540-2/", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"], "description": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "edition": 11, "reporter": "NVD", "published": "2018-01-04T08:29:00", "title": "CVE-2017-5753", "type": "cve", "enchantments": {"score": {"modified": "2018-03-24T10:44:28", "vector": "AV:L/AC:L/Au:M/C:N/I:P/A:C/", "value": 5.0}}, "assessment": {"system": "", "name": "", "href": ""}, "bulletinFamily": "NVD", "cvelist": ["CVE-2017-5753"], "scanner": [], "modified": "2018-04-19T21:29:20", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_e5:1620_v2", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon_e3:1245_v5", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5:2420_v2", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/h:intel:xeon_e3:1285_v4", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:xeon_e5:2650l_v3", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:xeon_e5:1630_v3", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:xeon_e5:2408l_v3", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:xeon_e3:1268l_v3", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/h:intel:xeon_e3:1240_v5", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e3:1275", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e5:2640_v2", "cpe:/h:intel:xeon_e5:2628l_v4", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e5:1650_v2", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:xeon_e5:1630_v4", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e5:2630", "cpe:/h:intel:xeon_e5:2403_v2", "cpe:/h:intel:xeon_e5:2643_v3", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon_e3:1230_v3", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:arm:cortex-a:73", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5:2637_v3", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:xeon_e5:2628l_v3", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:xeon_e5:1620_v3", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:xeon_e3:1241_v3", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:xeon_e3:1231_v3", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:2418l_v2", "cpe:/h:intel:xeon_e3:1276_v3", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:xeon_e5:1680_v4", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:xeon_e5:2630_v4", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e3:1230_v6", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3:1258l_v4", "cpe:/h:intel:xeon_e3:1230", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:xeon_e5:1650_v3", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:xeon_e5:2637_v2", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:arm:cortex-a:72", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:xeon_e3:1245_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:xeon_e3:1220", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:xeon_e3:1501m_v6", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:xeon_e3:1270_v2", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:xeon_e3:1225_v5", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3:1240l_v3", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:xeon_e5:2430_v2", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/h:intel:xeon_e5:2637_v4", "cpe:/h:intel:core_i7:4712hq", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:xeon_e5:2640_v4", "cpe:/h:intel:xeon_e5:2637", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:xeon_e3:1220_v2", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5:2609_v3", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e3:1280", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e5:2407", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:xeon_e5:2618l_v2", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e3:1240", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_e5:1620", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e3:1245_v6", "cpe:/h:intel:xeon_e3:1286_v3", "cpe:/h:intel:xeon_e5:2643_v2", "cpe:/h:intel:xeon_e5:2648l", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:xeon_e5:2618l_v3", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:xeon_e5:2450", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:xeon_e5:2430", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:xeon_e3:1220_v5", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5:2603_v3", "cpe:/h:intel:xeon_e5:2428l_v2", "cpe:/h:intel:xeon_e3:1235", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:arm:cortex-a:17", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:xeon_e3:1230l_v3", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/h:intel:core_i3:4158u", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:xeon_e5:2648l_v2", "cpe:/h:intel:xeon_e3:1260l", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:xeon_e3:1225_v3", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e3:1280_v2", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon_e5:2650_v4", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/h:intel:xeon_e3:1220_v6", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:xeon_e5:2630l_v2", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:core_i5:4690t", "cpe:/h:arm:cortex-a:57", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:xeon_e5:2430l", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:xeon_e5:2608l_v3", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3:1285_v3", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:xeon_e5:1660_v2", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e5:2650l_v2", "cpe:/h:intel:core_i5:2320", "cpe:/h:intel:xeon_e5:2438l_v3", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:xeon_e5:2650", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:xeon_e3:1275_v2", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e5:2603_v4", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e3:1275l_v3", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:xeon_e5:2609_v4", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:xeon_e3:1220l", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e3:1105c_v2", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:xeon_e3:1275_v3", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:xeon_e5:2623_v3", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3:1505m_v5", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e5:2440", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_gold:6140m", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon_e3:1505l_v5", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:xeon_e5:2470", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:xeon_e5:2608l_v4", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/h:intel:xeon_e5:2648l_v4", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:xeon_e3:1240_v2", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:xeon_e5:2448l", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:arm:cortex-a:9", "cpe:/h:intel:xeon_gold:5120t", "cpe:/h:intel:xeon_e3:1280_v6", "cpe:/h:intel:xeon_e3:1285l_v4", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:core_i3:6320", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:2640_v3", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e3:1240_v6", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e3:1125c", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:arm:cortex-a:15", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3:1220l_v2", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:xeon_e5:2650_v3", "cpe:/h:intel:core_i7:4770s", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:xeon_e5:1428l_v2", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e3:1271_v3", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:core_i5:2400", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:xeon_e5:2450l", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e3:1246_v3", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:xeon_bronze:3104", "cpe:/h:intel:core_i3:3245", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e5:2643", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e3:1240_v3", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:xeon_e5:2620_v4", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:xeon_e5:2623_v4", "cpe:/h:intel:xeon_e5:2418l", "cpe:/h:intel:xeon_e3:1225_v6", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon_e5:2620_v2", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon_e3:1220l_v3", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon_bronze:3106", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e5:2630l_v4", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/h:intel:xeon_e5:2448l_v2", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:xeon_e5:1660", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:xeon_e3:1265l_v3", "cpe:/h:intel:xeon_e3:1290", "cpe:/h:intel:core_i5:6287u", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon_e5:1660_v4", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:xeon_e3:1285l_v3", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:xeon_e5:2609", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e5:2418l_v3", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:xeon_e5:2620", "cpe:/h:intel:xeon_e5:2603_v2", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon_e3:1230_v2", "cpe:/h:intel:xeon_e5:2640", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:arm:cortex-a:75", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e3:1265l_v4", "cpe:/h:intel:xeon_e3:1280_v3", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:xeon_e3:1270_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:xeon_e5:2620_v3", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_e3:1286l_v3", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e3:1245_v3", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/h:intel:xeon_e5:2403", "cpe:/h:intel:xeon_e5:2440_v2", "cpe:/h:intel:xeon_e5:1428l", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e3:1270", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e5:2630l_v3", "cpe:/h:intel:xeon_e3:1260l_v5", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e3:1285_v6", "cpe:/h:intel:xeon_e5:1650_v4", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:xeon_e3:1235l_v5", "cpe:/h:intel:xeon_e5:1660_v3", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:xeon_e5:2609_v2", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:core_i5:4670s", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3:1240l_v5", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e3:1275_v6", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e3:1245", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:xeon_e5:2648l_v3", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e3:1270_v5", "cpe:/h:intel:xeon_e5:2628l_v2", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:xeon_e3:1270_v6", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e3:1225", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5:1428l_v3", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e3:1505l_v6", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:xeon_e3:1268l_v5", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:xeon_e5:2603", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e5:1620_v4", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:xeon_e3:1230_v5", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:xeon_e5:2630l", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e3:1501l_v6", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:xeon_e5:2428l", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2430l_v2", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/h:intel:xeon_e5:2630_v2", "cpe:/h:intel:xeon_e5:2470_v2", "cpe:/h:intel:xeon_e5:2650l", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:xeon_e5:2630_v3", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/h:intel:xeon_e3:1265l_v2", "cpe:/h:intel:core_i5:2450p", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:xeon_e3:1125c_v2", "cpe:/h:intel:xeon_e3:1281_v3", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:xeon_e3:1290_v2", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e5:1650", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e5:2643_v4", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2407_v2", "cpe:/h:intel:xeon_e5:2650_v2", "cpe:/h:intel:xeon_e3:1225_v2", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:xeon_e5:2450l_v2", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:core_i7:7700hq", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:xeon_e5:2428l_v3", "cpe:/h:intel:core_i5:4302y", "cpe:/h:intel:xeon_e3:1105c", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon_e5:2420", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/h:intel:xeon_e3:1220_v3", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:xeon_e5:1680_v3", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:xeon_e3:1275_v5", "cpe:/h:intel:xeon_e5:2618l_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:xeon_e5:2450_v2", "cpe:/h:intel:xeon_e3:1278l_v4", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e3:1280_v5", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426", "cpe:/h:intel:xeon_e3:1226_v3"], "id": "CVE-2017-5753", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-04-04T10:54:35", "references": ["https://usn.ubuntu.com/3597-1/", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html", "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "https://support.citrix.com/article/CTX231399", "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "https://access.redhat.com/errata/RHSA-2018:0292", "http://xenbits.xen.org/xsa/advisory-254.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html", "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc", "https://support.f5.com/csp/article/K91229003", "https://www.synology.com/support/security/Synology_SA_18_01", "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "https://usn.ubuntu.com/3522-4/", "https://support.lenovo.com/us/en/solutions/LEN-18282", "https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html", "https://usn.ubuntu.com/3522-3/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "https://usn.ubuntu.com/3523-1/", "https://usn.ubuntu.com/usn/usn-3516-1/", "http://www.kb.cert.org/vuls/id/584653", "https://source.android.com/security/bulletin/2018-04-01", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html", "https://usn.ubuntu.com/3541-2/", "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "https://www.debian.org/security/2018/dsa-4078", "http://www.securityfocus.com/bid/102378", "https://usn.ubuntu.com/3597-2/", "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "https://developer.arm.com/support/security-update", "https://usn.ubuntu.com/3583-1/", "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "https://meltdownattack.com/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html", "http://www.securitytracker.com/id/1040071", "https://usn.ubuntu.com/usn/usn-3524-2/", "https://usn.ubuntu.com/usn/usn-3523-2/", "https://01.org/security/advisories/intel-oss-10003", "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "https://security.netapp.com/advisory/ntap-20180104-0001/", "https://usn.ubuntu.com/3540-2/", "https://usn.ubuntu.com/usn/usn-3522-2/", "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel", "https://www.debian.org/security/2018/dsa-4120", "https://usn.ubuntu.com/usn/usn-3525-1/", "https://www.debian.org/security/2018/dsa-4082"], "description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "edition": 13, "reporter": "NVD", "published": "2018-01-04T08:29:00", "title": "CVE-2017-5754", "type": "cve", "enchantments": {"score": {"modified": "2018-04-04T10:54:35", "vector": "AV:L/AC:L/Au:M/C:C/I:C/A:C/", "value": 6.5}}, "assessment": {"system": "", "name": "", "href": ""}, "bulletinFamily": "NVD", "cvelist": ["CVE-2017-5754"], "scanner": [], "modified": "2018-04-03T21:29:01", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_e5:1620_v2", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon_e3:1245_v5", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5:2420_v2", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/h:intel:xeon_e3:1285_v4", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:xeon_e5:2650l_v3", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:xeon_e5:1630_v3", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:xeon_e5:2408l_v3", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:xeon_e3:1268l_v3", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/h:intel:xeon_e3:1240_v5", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e3:1275", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e5:2640_v2", "cpe:/h:intel:xeon_e5:2628l_v4", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e5:1650_v2", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:xeon_e5:1630_v4", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e5:2630", "cpe:/h:intel:xeon_e5:2403_v2", "cpe:/h:intel:xeon_e5:2643_v3", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon_e3:1230_v3", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5:2637_v3", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:xeon_e5:2628l_v3", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:xeon_e5:1620_v3", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:xeon_e3:1241_v3", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:xeon_e3:1231_v3", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:2418l_v2", "cpe:/h:intel:xeon_e3:1276_v3", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:xeon_e5:1680_v4", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:xeon_e5:2630_v4", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e3:1230_v6", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3:1258l_v4", "cpe:/h:intel:xeon_e3:1230", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:xeon_e5:1650_v3", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:xeon_e5:2637_v2", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:xeon_e3:1245_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:xeon_e3:1220", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:xeon_e3:1501m_v6", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:xeon_e3:1270_v2", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:xeon_e3:1225_v5", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3:1240l_v3", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:xeon_e5:2430_v2", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/h:intel:xeon_e5:2637_v4", "cpe:/h:intel:core_i7:4712hq", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:xeon_e5:2640_v4", "cpe:/h:intel:xeon_e5:2637", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:xeon_e3:1220_v2", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5:2609_v3", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e3:1280", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e5:2407", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:xeon_e5:2618l_v2", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e3:1240", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_e5:1620", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e3:1245_v6", "cpe:/h:intel:xeon_e3:1286_v3", "cpe:/h:intel:xeon_e5:2643_v2", "cpe:/h:intel:xeon_e5:2648l", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:xeon_e5:2618l_v3", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:xeon_e5:2450", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:xeon_e5:2430", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:xeon_e3:1220_v5", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5:2603_v3", "cpe:/h:intel:xeon_e5:2428l_v2", "cpe:/h:intel:xeon_e3:1235", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:xeon_e3:1230l_v3", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/h:intel:core_i3:4158u", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:xeon_e5:2648l_v2", "cpe:/h:intel:xeon_e3:1260l", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:xeon_e3:1225_v3", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e3:1280_v2", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon_e5:2650_v4", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/h:intel:xeon_e3:1220_v6", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:xeon_e5:2630l_v2", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:core_i5:4690t", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:xeon_e5:2430l", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:xeon_e5:2608l_v3", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3:1285_v3", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:xeon_e5:1660_v2", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e5:2650l_v2", "cpe:/h:intel:core_i5:2320", "cpe:/h:intel:xeon_e5:2438l_v3", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:xeon_e5:2650", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:xeon_e3:1275_v2", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e5:2603_v4", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e3:1275l_v3", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:xeon_e5:2609_v4", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:xeon_e3:1220l", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e3:1105c_v2", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:xeon_e3:1275_v3", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:xeon_e5:2623_v3", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3:1505m_v5", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e5:2440", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_gold:6140m", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon_e3:1505l_v5", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:xeon_e5:2470", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:xeon_e5:2608l_v4", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/h:intel:xeon_e5:2648l_v4", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:xeon_e3:1240_v2", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:xeon_e5:2448l", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:intel:xeon_gold:5120t", "cpe:/h:intel:xeon_e3:1280_v6", "cpe:/h:intel:xeon_e3:1285l_v4", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:core_i3:6320", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:2640_v3", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e3:1240_v6", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e3:1125c", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3:1220l_v2", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:xeon_e5:2650_v3", "cpe:/h:intel:core_i7:4770s", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:xeon_e5:1428l_v2", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e3:1271_v3", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:core_i5:2400", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:xeon_e5:2450l", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e3:1246_v3", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:xeon_bronze:3104", "cpe:/h:intel:core_i3:3245", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e5:2643", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e3:1240_v3", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:xeon_e5:2620_v4", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:xeon_e5:2623_v4", "cpe:/h:intel:xeon_e5:2418l", "cpe:/h:intel:xeon_e3:1225_v6", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon_e5:2620_v2", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon_e3:1220l_v3", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon_bronze:3106", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e5:2630l_v4", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/h:intel:xeon_e5:2448l_v2", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:xeon_e5:1660", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:xeon_e3:1265l_v3", "cpe:/h:intel:xeon_e3:1290", "cpe:/h:intel:core_i5:6287u", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon_e5:1660_v4", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:xeon_e3:1285l_v3", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:xeon_e5:2609", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e5:2418l_v3", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:xeon_e5:2620", "cpe:/h:intel:xeon_e5:2603_v2", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon_e3:1230_v2", "cpe:/h:intel:xeon_e5:2640", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:arm:cortex-a:75", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e3:1265l_v4", "cpe:/h:intel:xeon_e3:1280_v3", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:xeon_e3:1270_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:xeon_e5:2620_v3", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_e3:1286l_v3", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e3:1245_v3", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/h:intel:xeon_e5:2403", "cpe:/h:intel:xeon_e5:2440_v2", "cpe:/h:intel:xeon_e5:1428l", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e3:1270", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e5:2630l_v3", "cpe:/h:intel:xeon_e3:1260l_v5", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e3:1285_v6", "cpe:/h:intel:xeon_e5:1650_v4", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:xeon_e3:1235l_v5", "cpe:/h:intel:xeon_e5:1660_v3", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:xeon_e5:2609_v2", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:core_i5:4670s", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3:1240l_v5", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e3:1275_v6", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e3:1245", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:xeon_e5:2648l_v3", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e3:1270_v5", "cpe:/h:intel:xeon_e5:2628l_v2", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:xeon_e3:1270_v6", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e3:1225", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5:1428l_v3", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e3:1505l_v6", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:xeon_e3:1268l_v5", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:xeon_e5:2603", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e5:1620_v4", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:xeon_e3:1230_v5", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:xeon_e5:2630l", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e3:1501l_v6", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:xeon_e5:2428l", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2430l_v2", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/h:intel:xeon_e5:2630_v2", "cpe:/h:intel:xeon_e5:2470_v2", "cpe:/h:intel:xeon_e5:2650l", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:xeon_e5:2630_v3", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/h:intel:xeon_e3:1265l_v2", "cpe:/h:intel:core_i5:2450p", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:xeon_e3:1125c_v2", "cpe:/h:intel:xeon_e3:1281_v3", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:xeon_e3:1290_v2", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e5:1650", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e5:2643_v4", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2407_v2", "cpe:/h:intel:xeon_e5:2650_v2", "cpe:/h:intel:xeon_e3:1225_v2", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:xeon_e5:2450l_v2", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:core_i7:7700hq", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:xeon_e5:2428l_v3", "cpe:/h:intel:core_i5:4302y", "cpe:/h:intel:xeon_e3:1105c", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon_e5:2420", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/h:intel:xeon_e3:1220_v3", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:xeon_e5:1680_v3", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:xeon_e3:1275_v5", "cpe:/h:intel:xeon_e5:2618l_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:xeon_e5:2450_v2", "cpe:/h:intel:xeon_e3:1278l_v4", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e3:1280_v5", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426", "cpe:/h:intel:xeon_e3:1226_v3"], "id": "CVE-2017-5754", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5754", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-03-16T11:22:27", "references": ["http://www.squid-cache.org/Advisories/SQUID-2016_2.txt", "http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch", "http://www.ubuntu.com/usn/USN-2921-1", "http://www.debian.org/security/2016/dsa-3522", "http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html", "http://rhn.redhat.com/errata/RHSA-2016-2600.html", "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html", "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html", "https://usn.ubuntu.com/3557-1/", "https://security.gentoo.org/glsa/201607-01", "http://www.openwall.com/lists/oss-security/2016/02/26/2", "http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch", "http://www.securitytracker.com/id/1035101"], "description": "http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.", "edition": 3, "reporter": "NVD", "published": "2016-02-27T00:59:05", "title": "CVE-2016-2571", "type": "cve", "enchantments": {"score": {"modified": "2018-03-16T11:22:27", "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N/", "value": 4.0}}, "assessment": {"system": "", "name": "", "href": ""}, "bulletinFamily": "NVD", "cvelist": ["CVE-2016-2571"], "scanner": [], "modified": "2018-03-15T21:29:01", "cpe": ["cpe:/a:squid-cache:squid:3.3.6", "cpe:/a:squid-cache:squid:3.0.stable21", "cpe:/a:squid-cache:squid:3.1.11", "cpe:/a:squid-cache:squid:3.1.0.18", "cpe:/a:squid-cache:squid:3.2.4", "cpe:/a:squid-cache:squid:3.0.stable23", "cpe:/a:squid-cache:squid:4.0.6", "cpe:/a:squid-cache:squid:3.2.2", "cpe:/a:squid-cache:squid:3.0.stable10", "cpe:/a:squid-cache:squid:3.4.0.2", "cpe:/a:squid-cache:squid:3.1.13", "cpe:/a:squid-cache:squid:3.0.stable18", "cpe:/a:squid-cache:squid:3.0.stable14", "cpe:/a:squid-cache:squid:3.3.0.2", "cpe:/a:squid-cache:squid:3.1.5", "cpe:/a:squid-cache:squid:3.1.0.12", "cpe:/a:squid-cache:squid:3.2.0.15", "cpe:/a:squid-cache:squid:3.0.stable4", "cpe:/a:squid-cache:squid:3.2.0.11", "cpe:/a:squid-cache:squid:3.4.0.1", "cpe:/a:squid-cache:squid:3.1.9", "cpe:/a:squid-cache:squid:3.0.stable5", "cpe:/a:squid-cache:squid:3.1.0.9", "cpe:/a:squid-cache:squid:3.3.4", "cpe:/a:squid-cache:squid:3.0", "cpe:/a:squid-cache:squid:3.4.1", "cpe:/a:squid-cache:squid:3.2.7", "cpe:/a:squid-cache:squid:3.0.stable8", "cpe:/a:squid-cache:squid:3.4.8", "cpe:/a:squid-cache:squid:3.2.0.16", "cpe:/a:squid-cache:squid:3.0.stable2", "cpe:/a:squid-cache:squid:3.2.0.13", "cpe:/a:squid-cache:squid:3.3.9", "cpe:/a:squid-cache:squid:3.0.stable15", "cpe:/a:squid-cache:squid:3.2.11", "cpe:/a:squid-cache:squid:3.5.0.1", "cpe:/a:squid-cache:squid:3.4.11", "cpe:/a:squid-cache:squid:3.3.1", "cpe:/a:squid-cache:squid:3.2.3", "cpe:/a:squid-cache:squid:3.3.7", "cpe:/a:squid-cache:squid:3.1.14", "cpe:/a:squid-cache:squid:3.0.stable16:rc1", "cpe:/a:squid-cache:squid:3.4.10", "cpe:/a:squid-cache:squid:3.2.5", "cpe:/a:squid-cache:squid:3.2.6", "cpe:/a:squid-cache:squid:3.1.2", "cpe:/a:squid-cache:squid:3.1.0.4", "cpe:/a:squid-cache:squid:3.0.stable12", "cpe:/a:squid-cache:squid:3.3.3", "cpe:/a:squid-cache:squid:3.1.0.16", "cpe:/a:squid-cache:squid:3.0.stable11:rc1", "cpe:/a:squid-cache:squid:3.1.0.8", "cpe:/a:squid-cache:squid:3.0:rc4", "cpe:/a:squid-cache:squid:3.0.stable13", "cpe:/a:squid-cache:squid:3.2.0.8", "cpe:/a:squid-cache:squid:3.2.0.10", "cpe:/a:squid-cache:squid:3.0.stable6", "cpe:/a:squid-cache:squid:3.0:-:pre7", "cpe:/a:squid-cache:squid:3.0:-:pre4", "cpe:/a:squid-cache:squid:3.1.0.10", "cpe:/a:squid-cache:squid:3.1.3", "cpe:/a:squid-cache:squid:4.0.2", "cpe:/a:squid-cache:squid:3.0.stable1", "cpe:/a:squid-cache:squid:3.0.stable19", "cpe:/a:squid-cache:squid:3.5.0.3", "cpe:/a:squid-cache:squid:3.2.8", "cpe:/a:squid-cache:squid:3.1.0.3", "cpe:/a:squid-cache:squid:3.0.stable3", "cpe:/a:squid-cache:squid:3.3.2", "cpe:/a:squid-cache:squid:3.2.0.14", "cpe:/a:squid-cache:squid:3.3.13", "cpe:/a:squid-cache:squid:3.0.stable25", "cpe:/a:squid-cache:squid:3.4.2", "cpe:/a:squid-cache:squid:3.1.0.11", "cpe:/a:squid-cache:squid:3.0.stable24", "cpe:/a:squid-cache:squid:3.3.10", "cpe:/a:squid-cache:squid:3.1.0.15", "cpe:/a:squid-cache:squid:3.2.1", "cpe:/a:squid-cache:squid:3.1.4", "cpe:/a:squid-cache:squid:3.4.12", "cpe:/a:squid-cache:squid:3.2.0.12", "cpe:/a:squid-cache:squid:3.0:-:pre2", "cpe:/a:squid-cache:squid:3.2.9", "cpe:/a:squid-cache:squid:3.1.0.6", "cpe:/a:squid-cache:squid:3.3.8", "cpe:/a:squid-cache:squid:3.1.0.14", "cpe:/a:squid-cache:squid:4.0.4", "cpe:/a:squid-cache:squid:3.2.0.3", "cpe:/a:squid-cache:squid:3.1.0.13", "cpe:/a:squid-cache:squid:3.3.12", "cpe:/a:squid-cache:squid:3.1.6", "cpe:/a:squid-cache:squid:3.1.0.1", "cpe:/a:squid-cache:squid:3.1.0.2", "cpe:/a:squid-cache:squid:3.4.3", "cpe:/a:squid-cache:squid:3.2.0.7", "cpe:/a:squid-cache:squid:3.0:-:pre6", "cpe:/a:squid-cache:squid:3.0.stable22", "cpe:/a:squid-cache:squid:3.2.0.1", "cpe:/a:squid-cache:squid:3.1.0.7", "cpe:/a:squid-cache:squid:3.2.0.4", "cpe:/a:squid-cache:squid:3.2.0.18", "cpe:/a:squid-cache:squid:3.1", "cpe:/a:squid-cache:squid:3.2.12", "cpe:/a:squid-cache:squid:3.0.stable9", "cpe:/a:squid-cache:squid:3.1.1", "cpe:/a:squid-cache:squid:3.3.0", "cpe:/a:squid-cache:squid:3.1.0.5", "cpe:/a:squid-cache:squid:3.5.0.4", "cpe:/a:squid-cache:squid:3.0.stable7", "cpe:/a:squid-cache:squid:3.0.stable16", "cpe:/a:squid-cache:squid:3.0:-:pre3", "cpe:/a:squid-cache:squid:3.1.10", "cpe:/a:squid-cache:squid:3.2.13", "cpe:/a:squid-cache:squid:3.0:-:pre1", "cpe:/a:squid-cache:squid:3.1.7", "cpe:/a:squid-cache:squid:3.1.8", "cpe:/a:squid-cache:squid:3.2.0.5", "cpe:/a:squid-cache:squid:3.0.stable11", "cpe:/a:squid-cache:squid:3.3.11", "cpe:/a:squid-cache:squid:3.5.1", "cpe:/a:squid-cache:squid:3.2.0.19", "cpe:/a:squid-cache:squid:3.2.0.17", "cpe:/a:squid-cache:squid:4.0.3", "cpe:/a:squid-cache:squid:4.0.5", "cpe:/a:squid-cache:squid:3.1.15", "cpe:/a:squid-cache:squid:3.2.0.9", "cpe:/a:squid-cache:squid:3.4.9", "cpe:/a:squid-cache:squid:3.3.5", "cpe:/a:squid-cache:squid:3.0.stable17", "cpe:/a:squid-cache:squid:3.0.stable20", "cpe:/a:squid-cache:squid:3.1.12", "cpe:/a:squid-cache:squid:3.3.0.3", "cpe:/a:squid-cache:squid:3.1.5.1", "cpe:/a:squid-cache:squid:3.0:-:pre5", "cpe:/a:squid-cache:squid:3.5.0.2", "cpe:/a:squid-cache:squid:3.1.0.17", "cpe:/a:squid-cache:squid:3.4.0.3", "cpe:/a:squid-cache:squid:3.2.0.2", "cpe:/a:squid-cache:squid:3.2.10", "cpe:/a:squid-cache:squid:3.2.0.6", "cpe:/a:squid-cache:squid:3.4.4", "cpe:/a:squid-cache:squid:3.4.13", "cpe:/a:squid-cache:squid:4.0.1"], "id": "CVE-2016-2571", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2571", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:17", "references": [], "description": "## Vulnerability Description\nVarious products contain an IKEv1 implementation flaw that may allow a remote denial of service. The issue is triggered when processing malformed IPSec IKE messages, and will result in loss of availability for the service.\n## Technical Description\nThe vulnerability was discovered using the PROTOS test suite \"c09-isakmp\".\n\nOpenswan 2 and freeswan (as implemented in SUE Linux) can be impacted by a crafted packet using an invalid key length 3DES request or unspecified vectors when Agressive Mode is enabled and the PSK is known. It is not clear if these attacks are specific to those two products or impact all products listed here.\n## Solution Description\nSun Microsystems, Inc.:\nSolaris 9:\nSPARC - Apply T-patch T113451-10.\nx86 - Apply T-patch T114435-09.\n\nSolaris 10\nSPARC - Apply T-patch T118371-06.\nx86 - Apply T-patch T118372-06\n\nJuniper Networks, Inc.:\nJUNOS:\nUpgrade to version 6.4 2005-07-28 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nJUNOSe:\nUpgrade to version 5-2-4p0-8, 5-2-5, 5-3-4p0-5, 6-0-2p0-5, 6-0-3, 6-1-1p0-7, 6-1-2, 7-0-0p0-1, 7-0-1, and 7-1-0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nStonesoft:\nStoneGate Firewall:\nUpgrade to version 2.6.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nStoneGate VPN Client:\nUpgrade to version 2.6.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nOpenswan:\nUpgrade to version 2.4.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nSecgo Software Oy:\nUpgrade to version 3.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n\nNortel Networks:\nContact Nortel Networks for upgrade information.\n\nCisco Systems, Inc.:\nVisit http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml#software for patch information.\n## Short Description\nVarious products contain an IKEv1 implementation flaw that may allow a remote denial of service. The issue is triggered when processing malformed IPSec IKE messages, and will result in loss of availability for the service.\n## References:\n[Vendor Specific Advisory URL](http://lists.openswan.org/pipermail/announce/2005-November/000008.html)\n[Vendor Specific Advisory URL](http://www.astaro.org/showflat.php?Cat=&Number=63678&page=0&view=collapsed&sb=5&o=&fpart=1#63678)\n[Vendor Specific Advisory URL](http://securityresponse.symantec.com/avcenter/security/Content/2005.11.21.html)\n[Vendor Specific Advisory URL](http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00602119)\n[Vendor Specific Advisory URL](ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-003.txt.asc)\n[Vendor Specific Advisory URL](http://www.juniper.net/support/security/alerts/PSN-2005-11-007.txt)\n[Vendor Specific Advisory URL](http://www.stonesoft.com/support/Security_Advisories/7244.html)\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/search/document.do?assetkey=1-26-102040-1)\n[Vendor Specific Advisory URL](http://www.astaro.org/showflat.php?Cat=&Number=63958&page=0&view=collapsed&sb=5&o=&fpart=1#63958)\n[Vendor Specific Advisory URL](http://www.fortinet.com/FortiGuardCenter/VU226364.html)\n[Vendor Specific Advisory URL](http://support.avaya.com/elmodocs2/security/ASA-2006-043.htm)\n[Vendor Specific Advisory URL](http://secgo.com/newsletter/20051114/CIP517_description.txt)\n[Vendor Specific Advisory URL](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00555601)\n[Vendor Specific Advisory URL](http://www.clavister.com/support/support_update_ISAKMP.html)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc)\n[Vendor Specific Advisory URL](https://www.osvdb.org/osvdb_backend/www.secgo.com/newsletter/20051114/CIP517_description.txt)\n[Vendor Specific Advisory URL](http://www.openswan.org/niscc2/)\n[Vendor Specific Advisory URL](http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=367651&RenditionID=)\n[Vendor Specific Advisory URL](http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00557788)\n[Vendor Specific Advisory URL](http://www.sw.nec.co.jp/ixseries/ix1k2k/Support/CERT/NISCC273756.html)\n[Vendor Specific Advisory URL](http://www2.adtran.com/support/isakmp/)\nSecurity Tracker: 1015210\nSecurity Tracker: 1015214\nSecurity Tracker: 1015227\nSecurity Tracker: 1015229\nSecurity Tracker: 1015248\nSecurity Tracker: 1015199\nSecurity Tracker: 1015201\nSecurity Tracker: 1015235\nSecurity Tracker: 1015247\nSecurity Tracker: 1015198\nSecurity Tracker: 1015202\nSecurity Tracker: 1015249\nSecurity Tracker: 1015727\nSecurity Tracker: 1015200\nSecurity Tracker: 1015203\nSecurity Tracker: 1015209\nSecurity Tracker: 1015254\n[Secunia Advisory ID:17554](https://secuniaresearch.flexerasoftware.com/advisories/17554/)\n[Secunia Advisory ID:17621](https://secuniaresearch.flexerasoftware.com/advisories/17621/)\n[Secunia Advisory ID:17822](https://secuniaresearch.flexerasoftware.com/advisories/17822/)\n[Secunia Advisory ID:17980](https://secuniaresearch.flexerasoftware.com/advisories/17980/)\n[Secunia Advisory ID:18115](https://secuniaresearch.flexerasoftware.com/advisories/18115/)\n[Secunia Advisory ID:18742](https://secuniaresearch.flexerasoftware.com/advisories/18742/)\n[Secunia Advisory ID:17566](https://secuniaresearch.flexerasoftware.com/advisories/17566/)\n[Secunia Advisory ID:17608](https://secuniaresearch.flexerasoftware.com/advisories/17608/)\n[Secunia Advisory ID:17593](https://secuniaresearch.flexerasoftware.com/advisories/17593/)\n[Secunia Advisory ID:18166](https://secuniaresearch.flexerasoftware.com/advisories/18166/)\n[Secunia Advisory ID:18179](https://secuniaresearch.flexerasoftware.com/advisories/18179/)\n[Secunia Advisory ID:19463](https://secuniaresearch.flexerasoftware.com/advisories/19463/)\n[Secunia Advisory ID:20210](https://secuniaresearch.flexerasoftware.com/advisories/20210/)\n[Secunia Advisory ID:17553](https://secuniaresearch.flexerasoftware.com/advisories/17553/)\n[Secunia Advisory ID:17668](https://secuniaresearch.flexerasoftware.com/advisories/17668/)\n[Secunia Advisory ID:17663](https://secuniaresearch.flexerasoftware.com/advisories/17663/)\n[Secunia Advisory ID:17838](https://secuniaresearch.flexerasoftware.com/advisories/17838/)\n[Secunia Advisory ID:17985](https://secuniaresearch.flexerasoftware.com/advisories/17985/)\n[Secunia Advisory ID:18446](https://secuniaresearch.flexerasoftware.com/advisories/18446/)\n[Secunia Advisory ID:19174](https://secuniaresearch.flexerasoftware.com/advisories/19174/)\n[Secunia Advisory ID:17567](https://secuniaresearch.flexerasoftware.com/advisories/17567/)\n[Secunia Advisory ID:17568](https://secuniaresearch.flexerasoftware.com/advisories/17568/)\n[Secunia Advisory ID:17581](https://secuniaresearch.flexerasoftware.com/advisories/17581/)\n[Secunia Advisory ID:17617](https://secuniaresearch.flexerasoftware.com/advisories/17617/)\n[Secunia Advisory ID:17598](https://secuniaresearch.flexerasoftware.com/advisories/17598/)\n[Secunia Advisory ID:17680](https://secuniaresearch.flexerasoftware.com/advisories/17680/)\n[Secunia Advisory ID:17684](https://secuniaresearch.flexerasoftware.com/advisories/17684/)\n[Secunia Advisory ID:18616](https://secuniaresearch.flexerasoftware.com/advisories/18616/)\n[Secunia Advisory ID:18836](https://secuniaresearch.flexerasoftware.com/advisories/18836/)\n[Secunia Advisory ID:19833](https://secuniaresearch.flexerasoftware.com/advisories/19833/)\n[Related OSVDB ID: 20870](https://vulners.com/osvdb/OSVDB:20870)\nRedHat RHSA: RHSA-2006:0267\nOther Advisory URL: http://www.cisco.com/warp/public/707/cisco-sa-20051114-ipsec.shtml\nOther Advisory URL: http://sourceforge.net/mailarchive/forum.php?thread_id=9017454&forum_id=32000\nOther Advisory URL: http://www.uniras.gov.uk/niscc/docs/br-20051114-01013.html?lang=en\nOther Advisory URL: http://isc.sans.org/diary.php?storyid=848\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2005-Dec/0007.html\nOther Advisory URL: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:020\nOther Advisory URL: http://www.ubuntulinux.org/usn/usn-221-1\nOther Advisory URL: http://www.ficora.fi/englanti/document/ISAKMP.pdf\nOther Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200512-04.xml\nOther Advisory URL: http://www.debian.org/security/2006/dsa-965\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-11/0221.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-12/0101.html\nMail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0403.html\nKeyword: CERT-FI: 7710\nKeyword: Internet Security Association and Key Management Protocol\nKeyword: NISCC Vulnerability Advisory 273756/NISCC/ISAKMP\nKeyword: PROTOS\nKeyword: HPSBTU02100,SSRT050979,c00602119\nGeneric Informational URL: http://www.ietf.org/rfc/rfc2408.txt\nGeneric Informational URL: http://www.ietf.org/rfc/rfc2401.txt\nGeneric Informational URL: http://www.ietf.org/rfc/rfc2409.txt\nGeneric Exploit URL: http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/index.html\nFrSIRT Advisory: ADV-2005-2408\nFrSIRT Advisory: ADV-2005-2855\nFrSIRT Advisory: ADV-2005-2417\nFrSIRT Advisory: ADV-2005-2470\nFrSIRT Advisory: ADV-2005-2678\n[CVE-2005-4564](https://vulners.com/cve/CVE-2005-4564)\n[CVE-2005-3733](https://vulners.com/cve/CVE-2005-3733)\n[CVE-2005-3732](https://vulners.com/cve/CVE-2005-3732)\n[CVE-2005-4566](https://vulners.com/cve/CVE-2005-4566)\n[CVE-2005-3672](https://vulners.com/cve/CVE-2005-3672)\n[CVE-2005-3668](https://vulners.com/cve/CVE-2005-3668)\n[CVE-2005-3669](https://vulners.com/cve/CVE-2005-3669)\n[CVE-2005-3673](https://vulners.com/cve/CVE-2005-3673)\n[CVE-2005-3670](https://vulners.com/cve/CVE-2005-3670)\n[CVE-2006-1646](https://vulners.com/cve/CVE-2006-1646)\n[CVE-2006-0718](https://vulners.com/cve/CVE-2006-0718)\n[CVE-2005-3915](https://vulners.com/cve/CVE-2005-3915)\n[CVE-2005-4570](https://vulners.com/cve/CVE-2005-4570)\n[CVE-2005-4565](https://vulners.com/cve/CVE-2005-4565)\n[CVE-2005-4465](https://vulners.com/cve/CVE-2005-4465)\n[CVE-2005-3674](https://vulners.com/cve/CVE-2005-3674)\n[CVE-2005-3671](https://vulners.com/cve/CVE-2005-3671)\n[CVE-2005-3768](https://vulners.com/cve/CVE-2005-3768)\n[CVE-2005-4321](https://vulners.com/cve/CVE-2005-4321)\n[CVE-2005-3985](https://vulners.com/cve/CVE-2005-3985)\nCERT VU: 226364\nBugtraq ID: 15797\nBugtraq ID: 15523\nBugtraq ID: 15560\nBugtraq ID: 15997\nBugtraq ID: 15666\nBugtraq ID: 16028\nBugtraq ID: 15479\nBugtraq ID: 16613\n", "edition": 1, "reporter": "PROTOS(protos@ee.oulu.fi)", "published": "2005-11-14T08:02:33", "title": "Multiple Vendor ISAKMP Protocol Unspecified DoS (PROTOS)", "type": "osvdb", "enchantments": {"score": {"modified": "2017-04-28T13:20:17", "vector": "AV:N/AC:M/Au:M/C:P/I:P/A:P/", "value": 5.4}}, "bulletinFamily": "software", "affectedSoftware": [{"name": "VPN Router", "version": "600", "operator": "eq"}, {"name": "VPN Router", "version": "1100", "operator": "eq"}, {"name": "IOS", "version": "12.4", "operator": "eq"}, {"name": "Switched Firewall", "version": "6000", "operator": "eq"}, {"name": "Symantec Gateway Security 5200", "version": "1.0", "operator": "eq"}, {"name": "Switched Firewall", "version": "5100", "operator": "eq"}, {"name": "VPN Router", "version": "2700", "operator": "eq"}, {"name": "VPN Router", "version": "200", "operator": "eq"}, {"name": "Application Switch", "version": "2216", "operator": "eq"}, {"name": "Crypto IP gateway/client", "version": "2.3", "operator": "eq"}, {"name": "IOS", "version": "12.4T", "operator": "eq"}, {"name": "VPN 3000 concentrators", "version": "4.7B", "operator": "eq"}, {"name": "Multiprotocol Router", "version": "5430", "operator": "eq"}, {"name": "VPN Gateway", "version": "3050", "operator": "eq"}, {"name": "Crypto IP gateway/client", "version": "3.0.0 - 3.0.82", "operator": "eq"}, {"name": "Multiservice Access Switch", "version": "4400", "operator": "eq"}, {"name": "BayStack Instant Internet", "version": "100-S", "operator": "eq"}, {"name": "PIX Firewall/ASA", "version": "7.0.1.3", "operator": "eq"}, {"name": "Multiservice Access Switch", "version": "4450", "operator": "eq"}, {"name": "Symantec Gateway Security 5310", "version": "1.0", "operator": "eq"}, {"name": "JUNOSe E-Series", "version": "5.2", "operator": "eq"}, {"name": "VPN Router", "version": "1740", "operator": "eq"}, {"name": "Contivity VPN Switch", "version": "1000", "operator": "eq"}, {"name": "MDS Series SanOS", "version": "2.1", "operator": "eq"}, {"name": "Contivity Secure IP Services Gateway", "version": "4500", "operator": "eq"}, {"name": "Application Switch", "version": "2424-SSL", "operator": "eq"}, {"name": "IOS", "version": "12.3T", "operator": "eq"}, {"name": "Ethernet Switch", "version": "8100", "operator": "eq"}, {"name": "Symantec Firewall /VPN Appliance 200R", "version": "Unknown or Unspecified", "operator": "eq"}, {"name": "Crypto IP client", "version": "3.1", "operator": "eq"}, {"name": "BayStack Instant Internet", "version": "400-S", "operator": "eq"}, {"name": "VPN Router", "version": "100", "operator": "eq"}, {"name": "Firewall Services Module (FWSM)", "version": "2.3", "operator": "eq"}, {"name": "Ethernet Routing Switch", "version": "8600", "operator": "eq"}, {"name": "Symantec Gateway Security 300", "version": "2.0", "operator": "eq"}, {"name": "IOS", "version": "12.2SXD", "operator": "eq"}, {"name": "VPN Router", "version": "5000", "operator": "eq"}, {"name": "Multiservice Access Switch", "version": "4430", "operator": "eq"}, {"name": "Contivity VPN Switch", "version": "1500", "operator": "eq"}, {"name": "PIX Firewall", "version": "6.3", "operator": "eq"}, {"name": "VPN Router", "version": "1010", "operator": "eq"}, {"name": "VPN 3000 concentrators", "version": "4.1H", "operator": "eq"}, {"name": "Contivity Secure IP Services Gateway", "version": "1600", "operator": "eq"}, {"name": "Symantec Gateway Security 400", "version": "2.0", "operator": "eq"}, {"name": "Multiservice Switch", "version": "15000/20000", "operator": "eq"}, {"name": "StoneGate VPN Client", "version": "2.6.0", "operator": "eq"}, {"name": "VPN Gateway", "version": "3070", "operator": "eq"}, {"name": "Multiservice Access Switch", "version": "4455", "operator": "eq"}, {"name": "Instant Internet", "version": "100-S", "operator": "eq"}, {"name": "5100", "version": "Unknown or Unspecified", "operator": "eq"}, {"name": "Crypto IP gateway/client", "version": "3.2.0 - 3.2.26", "operator": "eq"}, {"name": "Contivity Secure IP Services Gateway", "version": "2600", "operator": "eq"}, {"name": "VPN Router", "version": "1750", "operator": "eq"}, {"name": "StoneGate Firewall", "version": "2.6.0", "operator": "eq"}, {"name": "Ethernet Routing Switch", "version": "1424T", "operator": "eq"}, {"name": "Openswan", "version": "2.3.1", "operator": "eq"}, {"name": "JUNOSe E-Series", "version": "5.3", "operator": "eq"}, {"name": "Symantec Gateway Security (5000 Series)", "version": "3.0", "operator": "eq"}, {"name": "JUNOS M/T/J-Series (before 2005-07-28)", "version": "6.4", "operator": "eq"}, {"name": "Solaris", "version": "9", "operator": "eq"}, {"name": "JUNOSe E-Series", "version": "7.0", "operator": "eq"}, {"name": "Application Switch", "version": "2224", "operator": "eq"}, {"name": "Contivity VPN Switch", "version": "400", "operator": "eq"}, {"name": "Multiservice Switch (MSS)", "version": "7400", "operator": "eq"}, {"name": "Symantec Firewall /VPN Appliance 200", "version": "Unknown or Unspecified", "operator": "eq"}, {"name": "Openswan", "version": "2.4.0", "operator": "eq"}, {"name": "Symantec Enterprise Firewall", "version": "8.0", "operator": "eq"}, {"name": "Solaris", "version": "10", "operator": "eq"}, {"name": "Symantec Gateway Security 5400", "version": "2.0.1", "operator": "eq"}, {"name": "Multiservice Switch", "version": "15000", "operator": "eq"}, {"name": "Instant Internet", "version": "400-S", "operator": "eq"}, {"name": "Symantec Gateway Security 5300", "version": "1.0", "operator": "eq"}, {"name": "VPN Router", "version": "1700", "operator": "eq"}, {"name": "Application Switch", "version": "3408", "operator": "eq"}, {"name": "Multiprotocol Router", "version": "2430", "operator": "eq"}, {"name": "IPsec-tools", "version": "0.6.2", "operator": "eq"}, {"name": "Application Switch", "version": "2424", "operator": "eq"}, {"name": "VPN Router", "version": "1050", "operator": "eq"}, {"name": "JUNOSe E-Series", "version": "6.1", "operator": "eq"}, {"name": "Media Gateway", "version": "15000/7400", "operator": "eq"}, {"name": "Ethernet Routing Switch", "version": "8300", "operator": "eq"}, {"name": "JUNOSe E-Series", "version": "6.0", "operator": "eq"}, {"name": "Wireless Gateway", "version": "7250", "operator": "eq"}, {"name": "Contivity Secure IP Services Gateway", "version": "4600", "operator": "eq"}], "cvelist": ["CVE-2006-1646", "CVE-2005-3674", "CVE-2005-3768", "CVE-2005-3733", "CVE-2006-0718", "CVE-2005-3915", "CVE-2005-3672", "CVE-2005-3670", "CVE-2005-4465", "CVE-2005-3668", "CVE-2005-4570", "CVE-2005-4566", "CVE-2005-3985", "CVE-2005-3669", "CVE-2005-3732", "CVE-2005-4565", "CVE-2005-3671", "CVE-2005-4564", "CVE-2005-4321", "CVE-2005-3673"], "modified": "2005-11-14T08:02:33", "id": "OSVDB:20822", "href": "https://vulners.com/osvdb/OSVDB:20822", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}}